General

  • Target

    84a26ce5f17ba033ba44e10b774f3579d0f41db8186169b6052f261627f13b70

  • Size

    489KB

  • Sample

    250110-g9pycaxpcp

  • MD5

    6fbd4cfceb2089d98615557974ea3816

  • SHA1

    8b68d2362b4e6619857f63fb57f3ab92cb104b53

  • SHA256

    84a26ce5f17ba033ba44e10b774f3579d0f41db8186169b6052f261627f13b70

  • SHA512

    9d3ffb91ac6a667c776c5e12ed21a83b44375ba38f449f9a588e6c36118d2a146b79bd96567333f1c6fffc333c46b3a663ea7e44132987444da8e1cf1699f8dc

  • SSDEEP

    12288:PnvI47FWF7XZvSlAx7CA1q83W6yifoXx++IDcZ1nm+j:PvZFC16l41N3WjiF+IAZ1nF

Malware Config

Extracted

Family

warzonerat

C2

172.245.23.149:4020

Targets

    • Target

      RFQ 8976765564566787978754566787909875654567.scr

    • Size

      557KB

    • MD5

      f302ac3931ec4406589e92bb0ceb5a05

    • SHA1

      e9fc3f3264cd3a1ec6023493a5c96c2ba317755f

    • SHA256

      6b83778b6931df0a74268e44daf5ca87dee79b0360b1022e6976281c5a1c58de

    • SHA512

      a3ce33d824ccd13a368e974d0df5d33081474652223280fd8464339f59a2598d80b8c83490b543a3d2cb09af60d4a342fe918fdb72076dafe4fdfe954817922c

    • SSDEEP

      12288:8zll9Z7a0GM4Rb9So1JELBYaKMwHI3lpa+zD56gsjFQX0zHVjczn4SB0AjlEVwtw:qawL6Ib/N6zjFQERQn4SB1jRti

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Server Software Component: Terminal Services DLL

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Modifies WinLogon

    • Hide Artifacts: Hidden Users

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks