General

  • Target

    1300-172-0x0000000000400000-0x0000000001462000-memory.dmp

  • Size

    16.4MB

  • MD5

    ec7ffcd4910b787e156bd6c9b0c8263e

  • SHA1

    d8d0506f0a2e460cbef39138f8f050514e2aeb96

  • SHA256

    4849bcc4b4cb5be8725be8c153c20d26795bb2bcd44956fd9b2bce88847ce75b

  • SHA512

    1d2b15a5db72389aaf32d9564b83a654754cb33c691be835a84b05221de2ae64f8de2b2cff384ca5dd1fb828aeacc7c7459a6c48c1f84d90cbb7a9084f156831

  • SSDEEP

    3072:RARHROub6IiZktM+t4B6IZeAzaZyJCYzHHxgGT0Iw:RkxbQktMo4BRiyoYz6GTrw

Score
10/10

Malware Config

Extracted

Family

warzonerat

C2

vtzjnphtvnpckznxhxpb.duckdns.org:3657

Signatures

  • Warzone RAT payload 1 IoCs
  • Warzonerat family

Files

  • 1300-172-0x0000000000400000-0x0000000001462000-memory.dmp
    .exe windows x86


    Headers

    Sections