General

  • Target

    cc0fdb6946afd11917588ce448b752e3f49debcd09d2e4d6c6d04cc1dc774e92

  • Size

    610KB

  • Sample

    241128-zk3r1szmfy

  • MD5

    06fe875e4701de15eb98fef1e228d32b

  • SHA1

    cca987129e4a7ce3a9853e419ccdac32130310d3

  • SHA256

    cc0fdb6946afd11917588ce448b752e3f49debcd09d2e4d6c6d04cc1dc774e92

  • SHA512

    276b4d6d9e4e5f7176adc19fc38c377179847d76ac53ee49dc7a318cab3a222115aa96cc90ded61f4ef6a724d0a782da5f0315867f55045ed31fbc822f436e5e

  • SSDEEP

    12288:NqrK4A9bRZmqRiYmeTLBxg6NEtuhc07M6qAvqp9YfvkR:UrKHmqnmiLBx5NEYhcmM6q8qp2q

Malware Config

Extracted

Family

warzonerat

C2

176.223.112.134:4268

Targets

    • Target

      cc0fdb6946afd11917588ce448b752e3f49debcd09d2e4d6c6d04cc1dc774e92

    • Size

      610KB

    • MD5

      06fe875e4701de15eb98fef1e228d32b

    • SHA1

      cca987129e4a7ce3a9853e419ccdac32130310d3

    • SHA256

      cc0fdb6946afd11917588ce448b752e3f49debcd09d2e4d6c6d04cc1dc774e92

    • SHA512

      276b4d6d9e4e5f7176adc19fc38c377179847d76ac53ee49dc7a318cab3a222115aa96cc90ded61f4ef6a724d0a782da5f0315867f55045ed31fbc822f436e5e

    • SSDEEP

      12288:NqrK4A9bRZmqRiYmeTLBxg6NEtuhc07M6qAvqp9YfvkR:UrKHmqnmiLBx5NEYhcmM6q8qp2q

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks