Static task
static1
Behavioral task
behavioral1
Sample
e4cf2714_extracted.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
e4cf2714_extracted.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
e4cf2714_extracted
-
Size
108KB
-
MD5
8ca266d4d1ce81ab138e70a4736e0a83
-
SHA1
2e19837c1fdb29a7fd752c677f15da260ef48d41
-
SHA256
7142ea9e61e8c2b51d58d3745d6609b6c53edf8535de28bbcad79e63bca89a0a
-
SHA512
0e45c5d709b2aafe636a1c90fc9ef0b6b1f1ea3b2f442d68835bf76778da278c3d2244247b9d049742389efaca73bc5183ab5ef94f51c25bccd8eb866bce4d4e
Score
10/10
Malware Config
Extracted
Family
warzonerat
C2
137.117.59.51:5200
Signatures
-
Warzone RAT Payload 1 IoCs
Processes:
resource yara_rule sample warzonerat -
Warzonerat family
Files
-
e4cf2714_extracted.exe windows x86