Static task
static1
Behavioral task
behavioral1
Sample
4302db9a_extracted.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
4302db9a_extracted.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
4302db9a_extracted
-
Size
108KB
-
MD5
6b668125529079c58cfe5fd6722df803
-
SHA1
0b47072a4092c5b00095b18b0a40a4bc4785912d
-
SHA256
0982c148039738079fbf837c714b7be5aba99abe3193ce57a2668f1264865b41
-
SHA512
4aa56bda9b9d99ea1f0e21f85d4af602c54e3221a05b31a9be91e70a11cfb9b8583e55947f722c2095c43d400cccb9bc6beea6de439adedec31039ffda292bd6
Score
10/10
Malware Config
Extracted
Family
warzonerat
C2
168.61.222.215:5400
Signatures
-
Warzone RAT Payload 1 IoCs
Processes:
resource yara_rule sample warzonerat -
Warzonerat family
Files
-
4302db9a_extracted.exe windows x86