General

  • Target

    d4f508a5c681d315b9aa0c19dcd2803b_JaffaCakes118

  • Size

    277KB

  • Sample

    240908-wzas1asfmh

  • MD5

    d4f508a5c681d315b9aa0c19dcd2803b

  • SHA1

    7bdd5b60ae9f4d0a3b612bfe06e2f835c4ef74a2

  • SHA256

    2e9e628e383027ea678969f71b34bc212590e5f829fd55fd824cf9fab0014fe7

  • SHA512

    09dd265ca3f64affefd072344d2360e99ed48b9c6ef6fc009e4c5597e0181d4a12b220471a27ed9af1713b33b8aa74714ad75588b744ae5f5613dfc2566ba982

  • SSDEEP

    6144:5BXsAHqxGN77V2NBHJ8T+1ZD9iCPsTsoQF+i4GPBycvYP4Lwn:LcZI6XZD9in3S+iXUcAJ

Malware Config

Extracted

Family

warzonerat

C2

xilogrid.info:6080

Targets

    • Target

      PO-2019-0206DR.exe

    • Size

      684KB

    • MD5

      26b437c0fac1ab41712f80cbacc028bb

    • SHA1

      7af2f6e902aa95f030453618875b5f6665b9d1b8

    • SHA256

      00d8516cf44beee7b16042dc82dca4a1353e0f1a06210f8f5a576f8451e2c052

    • SHA512

      db626946cae02de525008e04519f4e7bd7523ae78e4a6446b6fb9c3a37312bb3edb7ed766867723e8484856a9b3efdb14965be0dfee2214117d58dbd8ed432ce

    • SSDEEP

      12288:H4QycNStCd0cDF2m/4q+wAfFjy2A0rJvjI/6dJyL/mU7obiS3Ii5W+JoljtH8lFf:YSSoNDF2m/4q+wAfFjy2A0FvjI/6dJyK

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks