Static task
static1
Behavioral task
behavioral1
Sample
94e06e20f3c2a738c5f507b08011b5cf5123f57ab23140e9377cd597387bebed.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
94e06e20f3c2a738c5f507b08011b5cf5123f57ab23140e9377cd597387bebed.exe
Resource
win10v20210410
windows10_x64
0 signatures
0 seconds
General
-
Target
94e06e20f3c2a738c5f507b08011b5cf5123f57ab23140e9377cd597387bebed
-
Size
113KB
-
MD5
d972674471d1f347c6a04b5b56531a2a
-
SHA1
9d5f3b87dd68ba5afba63e45ec404c14c4fde08c
-
SHA256
94e06e20f3c2a738c5f507b08011b5cf5123f57ab23140e9377cd597387bebed
-
SHA512
38db71960df971a3bc92ff5259a5d709f54dbeeacf47b5200ce9df29004fef01cd52026b56631864395a6810d442ad54bc73f5426560673a463609f0cd011fcb
Score
10/10
Malware Config
Extracted
Family
warzonerat
C2
lati10.ddns.net:1177
Signatures
-
Warzone RAT Payload 1 IoCs
Processes:
resource yara_rule sample warzonerat -
Warzonerat family
Files
-
94e06e20f3c2a738c5f507b08011b5cf5123f57ab23140e9377cd597387bebed.exe windows x86