General

  • Target

    4272-141-0x0000000000400000-0x000000000055A000-memory.dmp

  • Size

    1.4MB

  • MD5

    7be866ec6d3921dbc59be22daf503128

  • SHA1

    df9bcac64023660aca49e034ad62f550549edf9c

  • SHA256

    97b8ed3161b1ae6c3e28a679e9b342c9be954417b378366007b30f2b96aa0279

  • SHA512

    340e04598244a5daa5e0de5bdfec02db0e776d4bc8daff6f67e3912e40ddcc0882b842af08fce441610f18dbff49a3b7240d81397937f291341226f20ed9c8be

  • SSDEEP

    3072:K7W9jps0Tx4azG6GweOTir5axbjNCz45LT7a:KwpsERzGKurEXCzeLT7a

Score
10/10

Malware Config

Extracted

Family

warzonerat

C2

171.22.30.72:52011

Signatures

  • Warzone RAT payload 1 IoCs
  • Warzonerat family

Files

  • 4272-141-0x0000000000400000-0x000000000055A000-memory.dmp
    .exe windows x86


    Headers

    Sections