General

  • Target

    2652-163-0x0000000003680000-0x00000000037DA000-memory.dmp

  • Size

    1.4MB

  • MD5

    06d2b67f204797840dee6243bf7e417a

  • SHA1

    01ad0edbf68bee9aa4d1a59eb3e464bafee49c3d

  • SHA256

    6ee8c4723e5f466e08762e0bf2a8f0bcf3564c3d095d360576016be61f6c4b6c

  • SHA512

    21934869afa88169613b54715279ecafd4ce94b91cdc20af06d6a013b0d39c35b562dc142418a28005375eadd1db511c3cf3911b601607551551849cab281d96

  • SSDEEP

    3072:+kcxSeENurJUDuCYQL/kSGxsBunz1Cz4ULT75:+k0ENur7CzXwsB41CzjLT7

Score
10/10

Malware Config

Extracted

Family

warzonerat

C2

111.90.151.174:5200

Signatures

  • Warzone RAT payload 1 IoCs
  • Warzonerat family

Files

  • 2652-163-0x0000000003680000-0x00000000037DA000-memory.dmp
    .dll windows x86


    Headers

    Sections