Analysis

  • max time kernel
    59s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/03/2023, 23:12 UTC

General

  • Target

    WARZONE RAT 3.03/Datas/SocksManager.exe

  • Size

    8KB

  • MD5

    e659818d6efe1953e14c9ece3b24a14c

  • SHA1

    771ee6fa69d72d337e108305a609d4b96b9db5d4

  • SHA256

    28195831f7e09ddf9bbe28ec957c1f380d27cf9cc3ebf538beaada0e4e74886a

  • SHA512

    49acf7e0341707f1094da620660aac7af2b5ced92ff4a1f82fb274091666cb9d5c70bf5532020d08a0088f490a887fa734915243a36f2e69bcabacf0caf38333

  • SSDEEP

    96:OFkBFvEm0IBRNHUPs+EsZRkCMJe0+5JGS4fVfaFDF8IEt0mGu4RzNt:OonHUEhWPH0iGS4flaL8IEKmEz

Score
1/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\WARZONE RAT 3.03\Datas\SocksManager.exe
    "C:\Users\Admin\AppData\Local\Temp\WARZONE RAT 3.03\Datas\SocksManager.exe"
    1⤵
      PID:1456

    Network

    • flag-us
      DNS
      1.208.79.178.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      1.208.79.178.in-addr.arpa
      IN PTR
      Response
      1.208.79.178.in-addr.arpa
      IN PTR
      https-178-79-208-1amsllnwnet
    • flag-us
      DNS
      104.219.191.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      104.219.191.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      95.221.229.192.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      95.221.229.192.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      209.205.72.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      209.205.72.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      86.23.85.13.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      86.23.85.13.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      63.13.109.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      63.13.109.52.in-addr.arpa
      IN PTR
      Response
    • 117.18.232.240:80
      322 B
      7
    • 20.190.160.17:443
      40 B
      1
    • 52.152.110.14:443
      260 B
      5
    • 13.69.239.74:443
      322 B
      7
    • 117.18.232.240:80
      322 B
      7
    • 117.18.232.240:80
      322 B
      7
    • 173.223.113.164:443
      322 B
      7
    • 173.223.113.131:80
      322 B
      7
    • 131.253.33.203:80
      322 B
      7
    • 8.8.8.8:53
      1.208.79.178.in-addr.arpa
      dns
      71 B
      116 B
      1
      1

      DNS Request

      1.208.79.178.in-addr.arpa

    • 8.8.8.8:53
      104.219.191.52.in-addr.arpa
      dns
      73 B
      147 B
      1
      1

      DNS Request

      104.219.191.52.in-addr.arpa

    • 8.8.8.8:53
      95.221.229.192.in-addr.arpa
      dns
      73 B
      144 B
      1
      1

      DNS Request

      95.221.229.192.in-addr.arpa

    • 8.8.8.8:53
      209.205.72.20.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      209.205.72.20.in-addr.arpa

    • 8.8.8.8:53
      86.23.85.13.in-addr.arpa
      dns
      70 B
      144 B
      1
      1

      DNS Request

      86.23.85.13.in-addr.arpa

    • 8.8.8.8:53
      63.13.109.52.in-addr.arpa
      dns
      71 B
      145 B
      1
      1

      DNS Request

      63.13.109.52.in-addr.arpa

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1456-133-0x0000000000740000-0x0000000000748000-memory.dmp

      Filesize

      32KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.