General

  • Target

    396-82-0x0000000000400000-0x000000000041D000-memory.dmp

  • Size

    116KB

  • MD5

    1d0fddbac9930554157ada4f3cf6d4be

  • SHA1

    fcc9a7ed4468d48b541df428da668af1644301d2

  • SHA256

    aa33e4c31a62f7046fdd9aaa8a5d56fb5c69fe71e92784afdbea1a2b15407e3f

  • SHA512

    bc9403ed39e2f9b7d78394fccce918691a63b7d1e8c67433e3f51ca1cde85d1a910f69952c16d5621c0b238f7163c719b2db614382c78e2f92f4b1c85a744a4a

  • SSDEEP

    1536:5Csejmb+6BQyusX1UjtA0uWRf/eloc/9T1jVEyp:AtD6jSm0uWRfCogTjVEG

Score
10/10

Malware Config

Extracted

Family

warzonerat

C2

micasamiwedding.duckdns.org:1104

Signatures

  • Warzone RAT payload 1 IoCs
  • Warzonerat family

Files

  • 396-82-0x0000000000400000-0x000000000041D000-memory.dmp
    .exe windows x86


    Headers

    Sections