Static task
static1
Behavioral task
behavioral1
Sample
78cedf4c16277b4ef72d3f5c3cb14f36ce338b6e62d05fa48951a04c33ec59b0.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
78cedf4c16277b4ef72d3f5c3cb14f36ce338b6e62d05fa48951a04c33ec59b0.exe
Resource
win10v20210410
windows10_x64
0 signatures
0 seconds
General
-
Target
78cedf4c16277b4ef72d3f5c3cb14f36ce338b6e62d05fa48951a04c33ec59b0
-
Size
1.8MB
-
MD5
fcc7dfafa2dc463f4e27c6862bd5065b
-
SHA1
2171e356f5ceedc51738b05a779cc3a43fbe4e0c
-
SHA256
78cedf4c16277b4ef72d3f5c3cb14f36ce338b6e62d05fa48951a04c33ec59b0
-
SHA512
fa818c86418e90efa970de9cf62f2e5c82cab6138c6e06122375fc9520f1047050d5721f3dd1066b452cec88967fb8dcdc1d876ece915646279ff840c6f96c82
Score
10/10
Malware Config
Signatures
-
Warzone RAT Payload 1 IoCs
Processes:
resource yara_rule sample warzonerat -
Warzonerat family
Files
-
78cedf4c16277b4ef72d3f5c3cb14f36ce338b6e62d05fa48951a04c33ec59b0.exe windows x86