General

  • Target

    672-99-0x0000000000400000-0x0000000001462000-memory.dmp

  • Size

    16.4MB

  • MD5

    e9d06045ff38343e2613e8060f5be598

  • SHA1

    9a2694d2e5c31a0c44c48209d0f91a387e73dfa8

  • SHA256

    ea5a8e629ac6f8556641f57bef1435b7c03465c33235085f9b2804f0ce1a3fd9

  • SHA512

    8a701ac7f2d28cf528b32767ce64d29b99028a46903789bd86ed17c3f98d1e4810e6151a54c2d5ef3bf8a535b5653c30045820ee1086fcb541c3ed2e70fcffbf

  • SSDEEP

    3072:RARHROub6IiZktM+t4B6IZeAzaZyJrYzHHxgGT0Iw:RkxbQktMo4BRiylYz6GTrw

Score
10/10

Malware Config

Extracted

Family

warzonerat

C2

forcema002.duckdns.org:8234

Signatures

  • Warzone RAT payload 1 IoCs
  • Warzonerat family

Files

  • 672-99-0x0000000000400000-0x0000000001462000-memory.dmp
    .exe windows x86


    Headers

    Sections