configzone

command module
v0.0.0-...-a4fcf6d Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Jul 28, 2021 License: GPL-3.0 Imports: 15 Imported by: 0

README

Go Report Card

configzone

Configzone is a static configuration extractor implemented in Golang for Warzone RAT (targeting Microsoft Windows). By default the script will print the extracted information to stdout (using the -v (verbose) flag is recommended for deeper investigations (hexdump, debug information in case of errors). It is also capable of dumping the malware configuration to disk as a JSON file with the -j flag.

Usage
go run configzone.go [-v] [-j] path/to/sample.exe
Screenshots

The script itself, running in verbose mode and with JSON output enabled:

A JSON file with the extracted configuration:

Sources/Credits

The idea of this config extractor is based on the work of Sergei Frankoff (OALabs), who covered the reverse engineering of Warzone RAT and basic config extraction in a video series on the OALabs Youtube channel.

The analysis write-ups by Domaintools and Yaroslav Harakhavik for Checkpoint Research were very useful as well.

Configuration layout/contents

The table below shows the keys used in the configuration of Warzone RAT. Some of these values could not be confirmed through reverse engineering the malware, yet. Multiple values were deducted from the screenshot created by Domaintools below and a leaked version of Warzone RAT 1.84.

Option Length in Bytes Color Value / Purpose Confirmed via Reverse Engineering
Host offset 4 Light Blue Length of the Command&Control Domain/IP
C2 Host x Green Command&Control Domain/IP
C2 Port 2 Orange Command&Control Server Port
Unknown 7 Red currently unknown
Install name offset 4 Light Blue Length of the Executable/Process name
Install name x Yellow Executable/Process name
Unknown 1 Red currently unknown
Run Key Offset 4 Light Blue Length of the Startup name
Run Key x Dark Blue Startup name (Registry persistence)
Retry Delay 4 Purple Time delay for C2 communication
Capabilities x Red Enabled/Disabled features?
Random string offset 4 Light Blue Length of the random string
Random string 20 Pink currently unknown

Below you can see three slightly different screenshots of config hexdumps created with configzone. I used the colors from the table above to highlight the configuration values. As you can see not every sample of Warzone RAT contains an "Install"- or "Startup name". Comparing the second and third sample also shows us that the section that I called "Capabilities" can vary in length. These differences could be due to reduced/extended feature sets with the Warzone RAT/POISON variants.


Sample 1

SHA-256: 4537fab9de768a668ab4e72ae2cce3169b7af2dd36a1723ddab09c04d31d61a5

Sample1

Sample 2

SHA-256: dd0c8701d0d9e62c7b354e97e41cfec6aa85da269cfa6a6490ba68cce58b2385

Sample2

Sample 3

SHA-256: 90001df66b709685e2654b9395f8ce67e9b070cbaa624d001a7dd2adbc8d8eda

Sample3

Testing

This configuration extractor has been tested successfully with the following samples:

SHA-256 Sample
3b84ae0d295425279c7636ff3de98950d1f6ebf935b79a23049842d85c9d905c Malshare
4467e78c9356062cd52d9d9da5dee3329558749d764ef8c72c14977ae65d139e Malshare
4537fab9de768a668ab4e72ae2cce3169b7af2dd36a1723ddab09c04d31d61a5 Malshare
535b6e5e8cd0fd9610c321d9b5e7fb95d18e0161a8a8d63a8a35913d6e6a4866 Malshare
788fb7921aa27add6ee4a6e7927c8475236eb9cf82faef193c4d113b8da886c0 Malshare
90001df66b709685e2654b9395f8ce67e9b070cbaa624d001a7dd2adbc8d8eda Malshare
bcf2e22757bf6abba668fcc0c627beb1d6e0c22491cdc723ebd5c55c90640e40 Malshare
dd0c8701d0d9e62c7b354e97e41cfec6aa85da269cfa6a6490ba68cce58b2385 Malshare
f3f654a41d57053362f7306f9a432c1341cbd57dce82f0940108a73917a8a934 Malshare

If you encounter an error with configzone, please file a bug report via an issue. Contributions are always welcome :)

Documentation

The Go Gopher

There is no documentation for this package.

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL