General

  • Target

    e20d35f98482f8c1f6e12f62c4c7136add7ef0fa7c09fc82bce4f958831d8c74

  • Size

    182KB

  • Sample

    240923-bard8s1fra

  • MD5

    24d3728d150290dc491b32c0d71c152f

  • SHA1

    d6ee4233fc400e02ba96b3fb692344f344e461e9

  • SHA256

    e20d35f98482f8c1f6e12f62c4c7136add7ef0fa7c09fc82bce4f958831d8c74

  • SHA512

    a2afb7a910f0f9235bc51d28f84a3c1c3f5a143ad44bd0355663d4c4cdd2ea2beaf27d48606860e08bebf46515996313cbbb37529858d79a1c6002dee4f1c3c0

  • SSDEEP

    3072:JsIf/BetA+4Ak5TOJ2+I07XjryLNMr9FDwmDvFcdDhQ6fSkzoGWfbqJKIzo:GfAfAaOIEvyLNMJFDwmToG6f5zJMmo

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txt

exe.dropper

https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txt

Extracted

Family

warzonerat

C2

109.248.151.156:2048

Targets

    • Target

      PURCHASE ORDER_0002341259-SCB.vbs

    • Size

      507KB

    • MD5

      8826da2dae531f219269ca314cec4f88

    • SHA1

      a5c24e29d2b9901a0849fe4c70dd67733febcb57

    • SHA256

      3ca2d0a1abba4f885e740032d2314993fac09ffffe14a4c6a89aacf65684e45b

    • SHA512

      9899a75d918671927f0dce5824135427899d75c88c153f78e8fa9ca5d39383a2cb33d092376ae631f507a3bd855636968724d9509d180e2c3a0a307a697e7de5

    • SSDEEP

      12288:r4IJKsC/UX6neBCN6Jy7f24Sjmr8NeAkWrIXbl/MCmgdTQFq30+XDNNRsgbZAKIo:kkgn2MHhso/

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Warzone RAT payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks