General

  • Target

    616-68-0x0000000000200000-0x00000000007DA000-memory.dmp

  • Size

    5.9MB

  • MD5

    01623385c5bbf73caae81034df5256b3

  • SHA1

    f5a5396b166afe8c7709c94df83a2dbf08f74265

  • SHA256

    c9b1d740469c3c9c9b69ab340e454d6374a067fdc434d71349783ec78b463c67

  • SHA512

    98a9e1288d7ab5349beb68eac9278c84799440ba8604a1743bbacc8add91559f06ee6327e7a092332cf70f15fea926be0d63130a5974b446d71b2473604a026a

  • SSDEEP

    3072:KbWdjps0zRrsSzzGiLeuTCL5aRtVRCz4ZLTba:KwpskxzGKOLE7bCz+LTba

Score
10/10

Malware Config

Extracted

Family

warzonerat

C2

morggy11.ooguy.com:5200

Signatures

  • Warzone RAT payload 1 IoCs
  • Warzonerat family

Files

  • 616-68-0x0000000000200000-0x00000000007DA000-memory.dmp
    .exe windows x86


    Headers

    Sections