General

  • Target

    0c8f916678d93c8e9a2782155ebfcdb6fc9011c66ab168347876eee7fb253398

  • Size

    940KB

  • Sample

    241218-x5yyfsyngy

  • MD5

    c704feb67862be348d4fc545de627440

  • SHA1

    564fda76a6f7d1b2970972404bc8541555cd96bb

  • SHA256

    0c8f916678d93c8e9a2782155ebfcdb6fc9011c66ab168347876eee7fb253398

  • SHA512

    bb777f60ba70e9ce6925483063ced754b8b68da966e4ae3390e944a223be6f1507b121c3ad29edec976ebf88b0441fd00bcbee5bd728566f1a1f07fea670346f

  • SSDEEP

    24576:5Q0JD/1x+HFCXHOlyV6q37YY+GhQPd+pap:vh/b+HweO75+YQPsp2

Malware Config

Extracted

Family

warzonerat

C2

tera.zapto.org:7374

Targets

    • Target

      0c8f916678d93c8e9a2782155ebfcdb6fc9011c66ab168347876eee7fb253398

    • Size

      940KB

    • MD5

      c704feb67862be348d4fc545de627440

    • SHA1

      564fda76a6f7d1b2970972404bc8541555cd96bb

    • SHA256

      0c8f916678d93c8e9a2782155ebfcdb6fc9011c66ab168347876eee7fb253398

    • SHA512

      bb777f60ba70e9ce6925483063ced754b8b68da966e4ae3390e944a223be6f1507b121c3ad29edec976ebf88b0441fd00bcbee5bd728566f1a1f07fea670346f

    • SSDEEP

      24576:5Q0JD/1x+HFCXHOlyV6q37YY+GhQPd+pap:vh/b+HweO75+YQPsp2

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks