Behavioral task
behavioral1
Sample
5032-148-0x0000000000400000-0x0000000000568000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5032-148-0x0000000000400000-0x0000000000568000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
5032-148-0x0000000000400000-0x0000000000568000-memory.dmp
-
Size
1.4MB
-
MD5
2c054513599f6bf6bcef8dad4a31a296
-
SHA1
4b720333275203858106b672813e1b08f0c04813
-
SHA256
b499d1ab2e5ee6503e1c87a0a67e918df56040ee037ea7bffd102d87b7af1970
-
SHA512
9d0a4c9da9e0129bbdd8c970228fc23a64fd8b1d93263ee7f9fa73b44ce21c7548c29257412430f18ce2f1daccf9c050b007d681d8cf0ada179e0a3e78999cee
-
SSDEEP
3072:WzPtbXqn6aR97tie5Niae2vl23G3Fzyffz8LTDhY:Wz1bXq6aR97ViJ2vlz9yffz8LTi
Malware Config
Signatures
-
Warzone RAT payload 1 IoCs
resource yara_rule sample warzonerat -
Warzonerat family
Files
-
5032-148-0x0000000000400000-0x0000000000568000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 146KB - Virtual size: 145KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.bss Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ