General

  • Target

    736-132-0x0000000003920000-0x0000000003A74000-memory.dmp

  • Size

    1.3MB

  • MD5

    7a9e79a84fcc75568b3f57ac0da8340c

  • SHA1

    1fd35f6882295144433d2762845bb2bbc68570e9

  • SHA256

    ecbe28e0efa0f3cf69a783a7314b50de1933d5280445e0df754325c41c0f5624

  • SHA512

    10c1e7d04fbeafea1d58ad325b3b717239d4281f01d073f6f2cefc90137d47079fa8229c5fe50f50970ae309df8e36c45b2697313a538dcbf757cc2b57f57710

  • SSDEEP

    1536:lyvtiFe9bi+o1iWr4Kb99EVMtfIw+MoG8dSVP/0OVE01:lyF9g1FF9EVfgt8wSOVE0

Score
10/10

Malware Config

Extracted

Family

warzonerat

C2

79.134.225.39:4567

Signatures

  • Warzone RAT payload 1 IoCs
  • Warzonerat family

Files

  • 736-132-0x0000000003920000-0x0000000003A74000-memory.dmp
    .dll windows x86


    Headers

    Sections