General

  • Target

    3080-139-0x0000000000400000-0x000000000055A000-memory.dmp

  • Size

    1.4MB

  • MD5

    3591b38b1cb53122e1635fbc12abbd67

  • SHA1

    772ccbb8b78877cf086c9e7c955ccec222528afa

  • SHA256

    62701fa1b1443b446ed1a47abba161f1cb90e1a8b414dd6d424af063af0aa651

  • SHA512

    c4a68b5ffcfc1de54d8174a94d34a7f2d5c1e08cf5b51806f9f2bfa001eda39d39eda5bcd5686c448f696a5d09176877e71074297ee539654e242d5513b1d23d

  • SSDEEP

    3072:K7W9jps0Tx4azG6GweOTir5axbjNCz45LT7a:KwpsERzGKurEXCzeLT7a

Score
10/10

Malware Config

Extracted

Family

warzonerat

C2

37.139.129.47:5200

Signatures

  • Warzone RAT payload 1 IoCs
  • Warzonerat family

Files

  • 3080-139-0x0000000000400000-0x000000000055A000-memory.dmp
    .exe windows x86


    Headers

    Sections