Static task
static1
Behavioral task
behavioral1
Sample
4412eb1d_extracted.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
4412eb1d_extracted.exe
Resource
win10v20210408
windows10_x64
0 signatures
0 seconds
General
-
Target
4412eb1d_extracted
-
Size
101KB
-
MD5
dc57435c2506f48097817fb36035c376
-
SHA1
de6f7a47ddebf15527e55a0f423f6adf752b79b8
-
SHA256
fbceecb919805bf25f79b60685f86e29ea203a8be4629853a0e717b43f09016e
-
SHA512
68c2bddd252f6bf8a7c3dbbd135a1858824b4adabb642f3e663defd6c0833cbff26b77dbf4d772fb50ef4e0f606913f860a4b697fb66e6b637c578ba47722ec6
Score
10/10
Malware Config
Extracted
Family
warzonerat
C2
speedballing.warzonedns.com:1949
Signatures
-
Warzone RAT Payload 1 IoCs
Processes:
resource yara_rule sample warzonerat -
Warzonerat family
Files
-
4412eb1d_extracted.exe windows x86