General

  • Target

    cc0daacf60697dcf0298f3f199e183c2_JaffaCakes118

  • Size

    330KB

  • Sample

    241206-kk624svlgp

  • MD5

    cc0daacf60697dcf0298f3f199e183c2

  • SHA1

    5dd3940b45f616a55420880c7dce8ee323869161

  • SHA256

    77a59a5b47de563c3d363ca27bb9a99a5b3faf366af126afcc78042151016c87

  • SHA512

    2939f20e28005669ebea810b327e27a67e8f8bcd16135c8ed2eda8cb12c37a0a7dc5915e476e6c84832528ce468997e5c9aaef0d7d7bd9994a1abfc61d76b089

  • SSDEEP

    6144:rvMt6V/hdmkcyvAIFtUx2yTF5vdzfaiWKBilS70e8mZC9TbUcuJJCoED:jMtehrcyvAI8MyT3lfjyS70e84QEO1D

Malware Config

Extracted

Family

warzonerat

C2

tobi12345.hopto.org:50501

Targets

    • Target

      Document pdf.exe

    • Size

      322KB

    • MD5

      909737a0a11765901cdce436737ac172

    • SHA1

      00d77473c837e0ed2887d6285a6c3c9e47ec83c8

    • SHA256

      39cd390039e7ad850abd64cfc0b387c77470153c09d35108cf96a893185804a2

    • SHA512

      e0989e9178201f126cc600b2d64c3609ff58f7ee3ab55f177fd7301f32cf13322afe7fdbe7334c52892ffc4f5b193fb38d841371c196ac44341bd54211dab2a2

    • SSDEEP

      6144:+vMt6V/hdmkcyvAIFtUx2yTF5vdzfaiWKBilS70e8mZC9TbUcuJJCoED:EMtehrcyvAI8MyT3lfjyS70e84QEO1D

    • Bazaloader family

    • Detects BazaLoader malware

      BazaLoader is a trojan that transmits logs to the Command and Control (C2) server, encoding them in BASE64 format through GET requests - JaffaCakes118.

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Drops startup file

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks