Behavioral task
behavioral1
Sample
aa3a16491408cdfa017bfc0f24a75e7528213823f54d06f359c863551b5ac0a0.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
aa3a16491408cdfa017bfc0f24a75e7528213823f54d06f359c863551b5ac0a0.dll
Resource
win10v2004-20230220-en
General
-
Target
aa3a16491408cdfa017bfc0f24a75e7528213823f54d06f359c863551b5ac0a0
-
Size
265KB
-
MD5
d7019ea3d04208df7ae5ecd3f8ba53b5
-
SHA1
530a83a09dea88e1be370f2a1bab9578052e365e
-
SHA256
aa3a16491408cdfa017bfc0f24a75e7528213823f54d06f359c863551b5ac0a0
-
SHA512
61e6207af360352054a4e66d4d881c641bc9c383de5cc3432683d5c73b583cc1a220d44e223a00a190fbb3367833976c110b7eb24fe05c2acb28e8a7c96e4f8f
-
SSDEEP
6144:fjP/MWafrhrpTP/NaLz+pMuWFCuKyQ5xnE0:6NrpTP/NaLz+pMuWFC7nxT
Malware Config
Signatures
-
Mywarzonrat family
-
Warzone RAT payload 1 IoCs
Processes:
resource yara_rule sample warzonerat -
Warzonerat family
-
Processes:
resource yara_rule sample MYWarZone_Rat
Files
-
aa3a16491408cdfa017bfc0f24a75e7528213823f54d06f359c863551b5ac0a0.dll windows x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorDllMain
Sections
.text Size: 264KB - Virtual size: 263KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ