General

  • Target

    SecuriteInfo.com.Variant.Jaik.73085.20962.11149

  • Size

    2.0MB

  • Sample

    220515-ya8d3sfcb4

  • MD5

    35ed3fe203fabde1b0d353815f9a273b

  • SHA1

    6a5e219fd96905b154295697ac6f72a13725f6a1

  • SHA256

    8d4020bea8924365724ff2c7eaffa0541f0ac4712c6b0a4723c5f68858fa306c

  • SHA512

    9657c11d07068f9e054bc701a0789e3918e4554f845b6cf6371299ce477fb17cef6f4ab97469becb5892bb66091435e1bfb187299a8d6722564813ec767b4cbb

Malware Config

Extracted

Family

warzonerat

C2

104.128.191.44:8080

Targets

    • Target

      SecuriteInfo.com.Variant.Jaik.73085.20962.11149

    • Size

      2.0MB

    • MD5

      35ed3fe203fabde1b0d353815f9a273b

    • SHA1

      6a5e219fd96905b154295697ac6f72a13725f6a1

    • SHA256

      8d4020bea8924365724ff2c7eaffa0541f0ac4712c6b0a4723c5f68858fa306c

    • SHA512

      9657c11d07068f9e054bc701a0789e3918e4554f845b6cf6371299ce477fb17cef6f4ab97469becb5892bb66091435e1bfb187299a8d6722564813ec767b4cbb

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT Payload

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks