General

  • Target

    3912-161-0x00000000037D0000-0x000000000392A000-memory.dmp

  • Size

    1.4MB

  • MD5

    6631a26d7cc323b9bd9b96dde1842114

  • SHA1

    26822b6eb182683dd539a1a99153592f81485565

  • SHA256

    5f89965ba5e97c9815e2c723d34a809325288d9e67e8b631395de79c369f3f8b

  • SHA512

    01e76b22a6be34107ed99b979d185adea3406ef9d30ba1d96332d93d69a82ab309afee5b1bc53725a4a41a1e8e30b87bbf2c78410fb76fa10d8e8d9d7cf81045

  • SSDEEP

    3072:R2oXOSeENYVaAscQQtoi4rexXMbCz4tLTu5:R2ASENYVBQ6Ki6CzuLTu

Score
10/10

Malware Config

Extracted

Family

warzonerat

C2

111.90.151.174:5200

Signatures

  • Warzone RAT payload 1 IoCs
  • Warzonerat family

Files

  • 3912-161-0x00000000037D0000-0x000000000392A000-memory.dmp
    .dll windows x86


    Headers

    Sections