General

  • Target

    RNSM00394.7z

  • Size

    31.2MB

  • Sample

    241101-2qjmfaxqen

  • MD5

    76b93f055cb09b9c703f1c934853ff39

  • SHA1

    7c82fe366d1ed04a5ada0cab06762e9e8136664d

  • SHA256

    38ab2002e8df4e98a0bfd4272f9dd3acb7c1ae6e9137a1343baf2f3e4994cec7

  • SHA512

    842e5e23cbac2b6031ac16be6869d2d296dc7233a802edb0a545d513a41698421b6c1a7019e6f470998785df221edad75f708af00ba9cfb35f7602558334aba1

  • SSDEEP

    786432:frOl5j9tSAcWHyw7AvM06/p3sC9C18FIz6oD2UHf:fS99vuuSC9C18QHf

Malware Config

Extracted

Family

azorult

C2

http://valhalla42.000webhostapp.com/testcode/index.php

Extracted

Path

C:\$Recycle.Bin\HOW_TO_RECOVERY_FILES.txt

Family

balaclava

Ransom Note
Hello! If you see this message - this means your files are now encrypted and are in a non-working state! Now only we can help you recover. If you are ready to restore the work - send us an email to the address [email protected] In the letter, specify your personal identifier, which you will see below. In the reply letter we will inform you the cost of decrypting your files. Before payment you can send us 1 files for test decryption. We will decrypt the files you requested and send you back. This ensures that we own the key to recover your data. The total file size should be no more than 2 MB, the files should not contain valuable information (databases, backups, large Excel spreadsheets ...). Email to contact us - [email protected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

Extracted

Family

warzonerat

C2

officedesktop004018.webredirect.org:5500

Targets

    • Target

      RNSM00394.7z

    • Size

      31.2MB

    • MD5

      76b93f055cb09b9c703f1c934853ff39

    • SHA1

      7c82fe366d1ed04a5ada0cab06762e9e8136664d

    • SHA256

      38ab2002e8df4e98a0bfd4272f9dd3acb7c1ae6e9137a1343baf2f3e4994cec7

    • SHA512

      842e5e23cbac2b6031ac16be6869d2d296dc7233a802edb0a545d513a41698421b6c1a7019e6f470998785df221edad75f708af00ba9cfb35f7602558334aba1

    • SSDEEP

      786432:frOl5j9tSAcWHyw7AvM06/p3sC9C18FIz6oD2UHf:fS99vuuSC9C18QHf

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Azorult family

    • Balaclava Malware

      Balaclava malware is a ransomware program.

    • Balaclava family

    • Dharma

      Dharma is a ransomware that uses security software installation to hide malicious activities.

    • Dharma family

    • GandCrab payload

    • Gandcrab

      Gandcrab is a Trojan horse that encrypts files on a computer.

    • Gandcrab family

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Renames multiple (450) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Warzone RAT payload

    • Blocklisted process makes network request

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Drops startup file

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks