General

  • Target

    4668-261-0x00000000033B0000-0x000000000350A000-memory.dmp

  • Size

    1.4MB

  • MD5

    f4925b779e63c6719fa425baf7b2f1bf

  • SHA1

    f28fae4f214275120b70af26b7cdd65436ea0e9f

  • SHA256

    c7949151406ecdab5ca509b2b162c43f86ebd14b95e9b79ead8ac929b433ac75

  • SHA512

    e7fb432a8eebeaf41d87856f2ab912181c891d59a15da63c4e95dfc4430ac3970689e92f0c5e7002cce10411033adb610fdc058ab09c81c41d05fd506d070e59

  • SSDEEP

    3072:H0+cSeENkNgoeEEEvmN5Wv1dyRuCz43LTE5:H0ENkNpEwwc7CzgLTE

Score
10/10

Malware Config

Extracted

Family

warzonerat

C2

111.90.151.174:5200

Signatures

  • Warzone RAT payload 1 IoCs
  • Warzonerat family

Files

  • 4668-261-0x00000000033B0000-0x000000000350A000-memory.dmp
    .dll windows x86


    Headers

    Sections