Behavioral task
behavioral1
Sample
900-66-0x0000000000400000-0x0000000000568000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
900-66-0x0000000000400000-0x0000000000568000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
900-66-0x0000000000400000-0x0000000000568000-memory.dmp
-
Size
1.4MB
-
MD5
24404b9ccb46774685b646b1f650fbff
-
SHA1
9b7522ba0d0d2aef7f9a31ba938bd509120e27d9
-
SHA256
f7a8e759df50e9d554c059f29e640c3dfca5c93f683ba330438a6cbd5189a0cb
-
SHA512
9db40b5f63c26687420549046a0ee8dd930f9d774b477d52143d3ce04c9261f8558ab58171cb1de84943a49e35b12feaa0f40a5731a3704022882dd652254dd0
-
SSDEEP
3072:WzPtbXqn6aR97tie5Niae2vl23G3FzyCfz8LTDQ:Wz1bXq6aR97ViJ2vlz9yCfz8LT
Malware Config
Signatures
-
Warzone RAT payload 1 IoCs
resource yara_rule sample warzonerat -
Warzonerat family
Files
-
900-66-0x0000000000400000-0x0000000000568000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 146KB - Virtual size: 145KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.bss Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ