General

  • Target

    JhHhHhHh.rar

  • Size

    231KB

  • Sample

    240912-jbl5xayblb

  • MD5

    182c781597e598e58d744b7f2da8fe39

  • SHA1

    c4869884bf4acb242ae57740a1c38cce7735b2ab

  • SHA256

    91bb1e8e29c4d6642e68376263e655a1d521fdfbfb68fbd406ba7f109d261ae1

  • SHA512

    900946a2854c38de225c95bf55ceeeedaed12646398e3a929b2c9a9ade3e2be1adf60f8c65d7ca619890b854646b81ddd954b9831e7ad922c18a299c701c87d6

  • SSDEEP

    6144:RcL2IaXfJspxvZYahmMCNsfQrcYl1RCJBFUVR31Ete/e9:R+21OFZYah/EsYrV1RgBFUVR3yte/G

Malware Config

Extracted

Family

warzonerat

C2

wzoner.duckdns.org:5355

Targets

    • Target

      JhHhHhHh.exe

    • Size

      280KB

    • MD5

      a7f32a8e11125a2b976ce58edfaca4cf

    • SHA1

      4f57f407cfe662b86b9aa34bf272ed1a6a7d0d7a

    • SHA256

      ffb8a170828d3de522aa7e5fc90da90c099a7da01a8255d5158150cae85d3690

    • SHA512

      b9ac4ceb8c3b20a6afbbc42f66a13fc68562df896de6b673d70cf162d6d09ad74edcfd0fac6baba77a6246b4cae8d75f9e55d7caa849c63d00f10fc134042c20

    • SSDEEP

      6144:cZ9LtXY3v+6PoBE5qGsAWiffVNBy0O12udoEUAEGpJwn4:cPhXu9Po8ZWi3JwldEOp

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT payload

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks