General

  • Target

    17265837652d55c0f124ae83612d8bd5caa1d7f12d178ec09d2162f830ec997362a0f3d454121.dat-decoded.exe

  • Size

    152KB

  • Sample

    240917-rymzqayamh

  • MD5

    731131ca09ae8250f278511bee660a19

  • SHA1

    74e5db66997151bb4332c657395d26abdc22f37d

  • SHA256

    bea1713591d822f671be473257016cc48f085ea6e217ba031c4ce7eef41523f6

  • SHA512

    cfa549b162a8d5551d1f66b7fc8ad0720d2034cfc8c01bf4a73b2f89f73b92c430288d7ec98b718f0cae64b30dffe91935d2cbb60907671d4c54b161cf7763f6

  • SSDEEP

    3072:4NLOpnhTdOw9YAJOzIY9gVl01T2ENipdDg0z5:4NLYdT97JSIFl0QENqF

Malware Config

Extracted

Family

warzonerat

C2

109.248.151.156:2048

Targets

    • Target

      17265837652d55c0f124ae83612d8bd5caa1d7f12d178ec09d2162f830ec997362a0f3d454121.dat-decoded.exe

    • Size

      152KB

    • MD5

      731131ca09ae8250f278511bee660a19

    • SHA1

      74e5db66997151bb4332c657395d26abdc22f37d

    • SHA256

      bea1713591d822f671be473257016cc48f085ea6e217ba031c4ce7eef41523f6

    • SHA512

      cfa549b162a8d5551d1f66b7fc8ad0720d2034cfc8c01bf4a73b2f89f73b92c430288d7ec98b718f0cae64b30dffe91935d2cbb60907671d4c54b161cf7763f6

    • SSDEEP

      3072:4NLOpnhTdOw9YAJOzIY9gVl01T2ENipdDg0z5:4NLYdT97JSIFl0QENqF

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v15

Tasks