General

  • Target

    ebb9c64a32a926993506ff5d4d81e8f6d0b6eb5e2dc14b30ab6055d243fb1d3a

  • Size

    620KB

  • Sample

    241212-j22chszpgq

  • MD5

    ba6ae91584cad2f0530d0be90cdc6253

  • SHA1

    fd892071274a167b3b95e72ba9dce3d93cffae14

  • SHA256

    ebb9c64a32a926993506ff5d4d81e8f6d0b6eb5e2dc14b30ab6055d243fb1d3a

  • SHA512

    257dfa62509fb865c1654203d4d242b83b886af6bef854574cea31881523715bdca675bc2b7477111c472a0b811b662891d29d504f19a36313f8ddc9db3b6626

  • SSDEEP

    12288:EgoECYd/kTOHsPYMlMitV+53P5yj+R8EYkUVqjwgxnzye7hr2SV++v+:EgoECTOHsPYMlMo8F5NFP62wgJywq+v+

Malware Config

Extracted

Family

warzonerat

C2

45.154.98.140:9087

Targets

    • Target

      PP-200446-FDA.exe

    • Size

      839KB

    • MD5

      59fbab4581eaeba4bf0463a1e10fd04d

    • SHA1

      2c8752a3eff0c8baf7f73d3a31c473fc3d9b0647

    • SHA256

      25c728d3e263928d1893e3b3979307f9959f4f1bcd2907a9e820649105e91cbb

    • SHA512

      e6f3cf77c4b38ba2ce245fd6b3a4eda354ef6716a5424e425df22af60593f5d1a7834ace0412072cb3aac834c1341f9e7d9218af60b9f7d403a6e21a8d8a009a

    • SSDEEP

      24576:UjlIhSPd+prp+l55U7J65FVACiJ6EXEr8:Ujl+SPspm6A58mI

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks