General

  • Target

    2a55348b41e5bc666de29f92002b206768a7f6b134e3901e48abe2ae7b4b6b47

  • Size

    541KB

  • Sample

    250109-k9velswjgt

  • MD5

    9cefa5afea5fad4675ffb709cce44c0d

  • SHA1

    d3710500885a0be57a73da69797b82cf8ee7f677

  • SHA256

    2a55348b41e5bc666de29f92002b206768a7f6b134e3901e48abe2ae7b4b6b47

  • SHA512

    642953cb966183556ac011c137d5f747adfadabbbb219b550e649d1de243988995c73cc82811b0baffdd73c381ff3381881a66e210136e366f4edc8e88e361b8

  • SSDEEP

    12288:qgYAfBxqFSQkvPxKrygmnFYE0PO6kBInDKtS0NCjVM:rYAfBxCknxEJmFqGEgS0QhM

Malware Config

Extracted

Family

warzonerat

C2

172.245.23.149:4020

Targets

    • Target

      RFQ 675766567456534534534534535434534564456453.scr

    • Size

      580KB

    • MD5

      6772fb0a8d636027e91b8fa238c4ab3c

    • SHA1

      1c1a0b57de7fa94ffadaaf91f846f5a8bea8f019

    • SHA256

      247bc285f9b882ff9318ecc7049c4209d43187c0657988dcce7fe5f0a6067be7

    • SHA512

      1ae632ec6c00852d2e9ee6953cc15905fab3599eff4340ac0902d99aa5fc0aeb7f21d1a8dc0ced672ee323e54dae374216f19d1f7475d857df04c2fdf94d319f

    • SSDEEP

      12288:ShjS4JRwD94pRZASB9+VUEJxcWEak/+s6uQxNlJcbq:StSqR2ipRZDgeEJxP3hb

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Server Software Component: Terminal Services DLL

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Modifies WinLogon

    • Hide Artifacts: Hidden Users

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks