General

  • Target

    sample

  • Size

    15KB

  • Sample

    241104-xrktnsvkgw

  • MD5

    9f8c29bb7d9c814ddfbb37968e0d69bf

  • SHA1

    e3dc535a2e5b6432e9bca15fee41ddf541c13446

  • SHA256

    de804a3edfe3326cc0af190007f77cf6a4fd4dbddec0d7f60aac6d9ce57c32cb

  • SHA512

    ac2c53c01bbdfdca07db91016741f67f21fae7082162d1ff44c4e3706ebd6c095394ec3f418511068af21b4075cf3722b0d435cdb067e1edc130b14bd513e54e

  • SSDEEP

    384:umj9HlAALRcomwFfNmBSZv5HvvQ1TCuzMEMhHPIKlkT2zp59FqJPku7:dSu2VDkC

Malware Config

Extracted

Family

warzonerat

C2

168.61.222.215:5400

Targets

    • Target

      sample

    • Size

      15KB

    • MD5

      9f8c29bb7d9c814ddfbb37968e0d69bf

    • SHA1

      e3dc535a2e5b6432e9bca15fee41ddf541c13446

    • SHA256

      de804a3edfe3326cc0af190007f77cf6a4fd4dbddec0d7f60aac6d9ce57c32cb

    • SHA512

      ac2c53c01bbdfdca07db91016741f67f21fae7082162d1ff44c4e3706ebd6c095394ec3f418511068af21b4075cf3722b0d435cdb067e1edc130b14bd513e54e

    • SSDEEP

      384:umj9HlAALRcomwFfNmBSZv5HvvQ1TCuzMEMhHPIKlkT2zp59FqJPku7:dSu2VDkC

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • ReZer0 packer

      Detects ReZer0, a packer with multiple versions used in various campaigns.

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Downloads MZ/PE file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks