Behavioral task
behavioral1
Sample
1612-157-0x0000000010670000-0x00000000107C7000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1612-157-0x0000000010670000-0x00000000107C7000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
1612-157-0x0000000010670000-0x00000000107C7000-memory.dmp
-
Size
1.3MB
-
MD5
3a372f0ace33ea159d4d4e46d9eb7abf
-
SHA1
060be15df331643d5a7e28361e1fa2f68af308fd
-
SHA256
ebbe75b7a8a124b07aadbb06337d313d8e6f7233380af84f94405b2faa106c16
-
SHA512
d6d5d034f286942c601ca5ded5f64e80695ad3cc84e480a9142231d3217a52c13bf411c61acb51f54182097686c3efb19667a2f7bdd5181269c1085b1fbad0af
-
SSDEEP
1536:PA0jP7/L1B5rVmN8sxHv2M28ix8EUaJxWZoB4u0OVE01Y:Pj1VmhaH8EFvW+0OVE0
Malware Config
Signatures
-
Warzone RAT payload 1 IoCs
resource yara_rule sample warzonerat -
Warzonerat family
Files
-
1612-157-0x0000000010670000-0x00000000107C7000-memory.dmp.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 116KB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE