General

  • Target

    1700-57-0x0000000000400000-0x0000000000554000-memory.dmp

  • Size

    1.3MB

  • MD5

    28de122a640fef8479d5a0ec14352f7d

  • SHA1

    5ab8743267d36937f0672ffcd34f68d8499e1047

  • SHA256

    539208dc2162bff39fec6c63f4f5a569b35d9359da249e473b27833f14212d26

  • SHA512

    d32ffff8113788d03d38f197c1846b5bbdc731d5ce6cd70d41131c15bf3e699816296a0ad18310c3b624fed2ff33de83acee14650b35bc22fa8fa8d8ca710636

  • SSDEEP

    1536:h0jP7/L1B5rVmN8sxHv2M28ix8EUaJxWZoB4u0OVE01G:K1VmhaH8EFvW+0OVE0

Score
10/10

Malware Config

Extracted

Family

warzonerat

C2

kellerwarzone.ddns.net:5200

Signatures

  • Warzone RAT payload 1 IoCs
  • Warzonerat family

Files

  • 1700-57-0x0000000000400000-0x0000000000554000-memory.dmp
    .exe windows x86


    Headers

    Sections