General

  • Target

    9b245deb2687e8eb0a0b688c3c2111c0N.exe

  • Size

    3.9MB

  • Sample

    240818-f8fslsyarb

  • MD5

    9b245deb2687e8eb0a0b688c3c2111c0

  • SHA1

    d52b5b6ce38165926c93fe00fc919f9d03d4a2d2

  • SHA256

    e1f4da5c15bd74cdba49f2f5fd8e048d71dcaefcb578afd71c40a6ebc92e1940

  • SHA512

    c925efddb9d95930172e43ae1fe415adb1f0aeafa2aec9cf1d20e0e82fbd8cdaf28187473d4e3581eea88baa29b87f37303290d793641d32ed20fe67c4a39444

  • SSDEEP

    98304:WsxoMikOEyJMoKigwvaoVsxoMikOEyJMoKigwvao3sxoMikOEyJMoKigwvaot:WsXRIMri/vpsXRIMri/vjsXRIMri/v

Malware Config

Extracted

Family

warzonerat

C2

victorybelng.ddns.net:13900

Targets

    • Target

      9b245deb2687e8eb0a0b688c3c2111c0N.exe

    • Size

      3.9MB

    • MD5

      9b245deb2687e8eb0a0b688c3c2111c0

    • SHA1

      d52b5b6ce38165926c93fe00fc919f9d03d4a2d2

    • SHA256

      e1f4da5c15bd74cdba49f2f5fd8e048d71dcaefcb578afd71c40a6ebc92e1940

    • SHA512

      c925efddb9d95930172e43ae1fe415adb1f0aeafa2aec9cf1d20e0e82fbd8cdaf28187473d4e3581eea88baa29b87f37303290d793641d32ed20fe67c4a39444

    • SSDEEP

      98304:WsxoMikOEyJMoKigwvaoVsxoMikOEyJMoKigwvao3sxoMikOEyJMoKigwvaot:WsXRIMri/vpsXRIMri/vjsXRIMri/v

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT payload

    • Suspicious Office macro

      Office document equipped with macros.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks