Behavioral task
behavioral1
Sample
2652-163-0x0000000003680000-0x00000000037DA000-memory.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2652-163-0x0000000003680000-0x00000000037DA000-memory.dll
Resource
win10v2004-20220901-en
General
-
Target
2652-163-0x0000000003680000-0x00000000037DA000-memory.dmp
-
Size
1.4MB
-
MD5
06d2b67f204797840dee6243bf7e417a
-
SHA1
01ad0edbf68bee9aa4d1a59eb3e464bafee49c3d
-
SHA256
6ee8c4723e5f466e08762e0bf2a8f0bcf3564c3d095d360576016be61f6c4b6c
-
SHA512
21934869afa88169613b54715279ecafd4ce94b91cdc20af06d6a013b0d39c35b562dc142418a28005375eadd1db511c3cf3911b601607551551849cab281d96
-
SSDEEP
3072:+kcxSeENurJUDuCYQL/kSGxsBunz1Cz4ULT75:+k0ENur7CzXwsB41CzjLT7
Malware Config
Extracted
warzonerat
111.90.151.174:5200
Signatures
-
Warzone RAT payload 1 IoCs
resource yara_rule sample warzonerat -
Warzonerat family
Files
-
2652-163-0x0000000003680000-0x00000000037DA000-memory.dmp.dll windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 93KB - Virtual size: 93KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.bss Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ