General

  • Target

    608-67-0x0000000000400000-0x000000000041D000-memory.dmp

  • Size

    116KB

  • MD5

    73bdc87030352f50c1b16e89973c2024

  • SHA1

    2f371c06ca0bbd6c80099e3a01fa8b3db8027cb9

  • SHA256

    b3cb8feacf844ec60e6ea9f5566ad17441e41af3e3c4943927ac933cb44c159b

  • SHA512

    d0e65d58e575a7f8f3c66648eb5b50c741dab943355e0d94e5a786baa99d6ca2318b6b418e2d13af36ea18d3346edf80daccdacd6fbd46bbb478326a261eb5b8

  • SSDEEP

    1536:5Csejmb+6BQyusX1UjtA0uWRf/elocS9T1jVEyY:AtD6jSm0uWRfCoJTjVED

Score
10/10

Malware Config

Extracted

Family

warzonerat

C2

dezember22.duckdns.org:1992

Signatures

  • Warzone RAT payload 1 IoCs
  • Warzonerat family

Files

  • 608-67-0x0000000000400000-0x000000000041D000-memory.dmp
    .exe windows x86


    Headers

    Sections