Behavioral task
behavioral1
Sample
3912-161-0x00000000037D0000-0x000000000392A000-memory.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3912-161-0x00000000037D0000-0x000000000392A000-memory.dll
Resource
win10v2004-20220901-en
General
-
Target
3912-161-0x00000000037D0000-0x000000000392A000-memory.dmp
-
Size
1.4MB
-
MD5
6631a26d7cc323b9bd9b96dde1842114
-
SHA1
26822b6eb182683dd539a1a99153592f81485565
-
SHA256
5f89965ba5e97c9815e2c723d34a809325288d9e67e8b631395de79c369f3f8b
-
SHA512
01e76b22a6be34107ed99b979d185adea3406ef9d30ba1d96332d93d69a82ab309afee5b1bc53725a4a41a1e8e30b87bbf2c78410fb76fa10d8e8d9d7cf81045
-
SSDEEP
3072:R2oXOSeENYVaAscQQtoi4rexXMbCz4tLTu5:R2ASENYVBQ6Ki6CzuLTu
Malware Config
Extracted
warzonerat
111.90.151.174:5200
Signatures
-
Warzone RAT payload 1 IoCs
resource yara_rule sample warzonerat -
Warzonerat family
Files
-
3912-161-0x00000000037D0000-0x000000000392A000-memory.dmp.dll windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 93KB - Virtual size: 93KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.bss Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ