Behavioral task
behavioral1
Sample
3552-338-0x0000000010670000-0x00000000107D0000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3552-338-0x0000000010670000-0x00000000107D0000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
3552-338-0x0000000010670000-0x00000000107D0000-memory.dmp
-
Size
1.4MB
-
MD5
d3bbe40f228a51eef623dacbbe7c9421
-
SHA1
dde16f16e60e2a9b367a824f2fea041c900104dd
-
SHA256
668b965605e071e7ac06d5c4547adfa9cf6db1b9123025da78b8669a0125a814
-
SHA512
e5e0df4be414c55c24c3f19e9056e8d8624e30cecfd63e52e67b4ba8781bd7cbc06a6a64278a55459668cd81f8064f879ec36d0123648d9ba3c3fde63f59ea4f
-
SSDEEP
3072:HoNLOpnhTdOw9YAJOzIY9gVl01T2ENipdDg0z5:HoNLYdT97JSIFl0QENqF
Malware Config
Signatures
-
Warzonerat family
Files
-
3552-338-0x0000000010670000-0x00000000107D0000-memory.dmp.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 155KB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE