General

  • Target

    4e7b587955e5bbae4252f39d3d646e343831f79b18435a29cb2ee0320f0c0d00.exe

  • Size

    474KB

  • Sample

    241120-zbcjgatcpj

  • MD5

    1532db0a3045edde067ec5a1c1dc7cc4

  • SHA1

    d390d55dfc7fd06c6b71df8f3fa2d6d3e6b8ebf8

  • SHA256

    4e7b587955e5bbae4252f39d3d646e343831f79b18435a29cb2ee0320f0c0d00

  • SHA512

    929b7640303982d908459e4c213d65c52fea82d77180db9d968f62cca14b455a2acc9a49b6d40687962aa652964d56b7d7d3475e762c45c0205660ca3d364257

  • SSDEEP

    12288:J8SIbw8eGrT3jSrmLdyHcrfokLSN0hGbpqJFTP2:JEbw8eGrTTjZy8rAoSN0EFqi

Malware Config

Extracted

Family

warzonerat

C2

37.221.65.140:6606

Targets

    • Target

      4e7b587955e5bbae4252f39d3d646e343831f79b18435a29cb2ee0320f0c0d00.exe

    • Size

      474KB

    • MD5

      1532db0a3045edde067ec5a1c1dc7cc4

    • SHA1

      d390d55dfc7fd06c6b71df8f3fa2d6d3e6b8ebf8

    • SHA256

      4e7b587955e5bbae4252f39d3d646e343831f79b18435a29cb2ee0320f0c0d00

    • SHA512

      929b7640303982d908459e4c213d65c52fea82d77180db9d968f62cca14b455a2acc9a49b6d40687962aa652964d56b7d7d3475e762c45c0205660ca3d364257

    • SSDEEP

      12288:J8SIbw8eGrT3jSrmLdyHcrfokLSN0hGbpqJFTP2:JEbw8eGrTTjZy8rAoSN0EFqi

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Looks for VirtualBox Guest Additions in registry

    • Warzone RAT payload

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks