General

  • Target

    JaffaCakes118_72073e830ab96af26475a2bf53846570

  • Size

    430KB

  • Sample

    250103-2gkhdaxjet

  • MD5

    72073e830ab96af26475a2bf53846570

  • SHA1

    04b2d4f58a763bf428e09e0517623cbb350ad8f5

  • SHA256

    7008e3c7c828dfad8c3028ec4fdf4325ceff7fc71e64481f129764c72683fd32

  • SHA512

    ad365bca8e6166c769878a97a65fa9019aa70d5e8e8a0e09820b981f0bf9cbbdb367ff99a56dbb7578674888e4f01c99e310b90429263e716f23587f8ef95181

  • SSDEEP

    12288:XXqYEhqGzOMBszSNc5d6jT38xisVp2fRu:X6YEn3aOjTls

Malware Config

Extracted

Family

warzonerat

C2

kw9d0w.duckdns.org:4192

Targets

    • Target

      JaffaCakes118_72073e830ab96af26475a2bf53846570

    • Size

      430KB

    • MD5

      72073e830ab96af26475a2bf53846570

    • SHA1

      04b2d4f58a763bf428e09e0517623cbb350ad8f5

    • SHA256

      7008e3c7c828dfad8c3028ec4fdf4325ceff7fc71e64481f129764c72683fd32

    • SHA512

      ad365bca8e6166c769878a97a65fa9019aa70d5e8e8a0e09820b981f0bf9cbbdb367ff99a56dbb7578674888e4f01c99e310b90429263e716f23587f8ef95181

    • SSDEEP

      12288:XXqYEhqGzOMBszSNc5d6jT38xisVp2fRu:X6YEn3aOjTls

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks