General

  • Target

    632-143-0x0000000000400000-0x0000000000554000-memory.dmp

  • Size

    1.3MB

  • MD5

    e8139791b706b75e94c1e3ae5a380e90

  • SHA1

    7d5bf726d45e601690b11a33c00bb19b991a2b48

  • SHA256

    2c6f1d025b73ee0e83c1d05823ce700d07642bb549f4c6c528cd434ed61b5fd1

  • SHA512

    110b7bde46b03fa519a2b8c79902f57297ff45cf512bbf4428ab27d6d82971704c6bbf82853fcb0063902df89ebd7b69dee95fb30f87c04709610c2d18672710

  • SSDEEP

    1536:h0jP7/L1B5rVmN8sxHv2M28ix8EUaJxWZoB4u0OVE01:K1VmhaH8EFvW+0OVE0

Score
10/10

Malware Config

Extracted

Family

warzonerat

C2

grotomnipobell.zapto.org:5230

Signatures

  • Warzone RAT payload 1 IoCs
  • Warzonerat family

Files

  • 632-143-0x0000000000400000-0x0000000000554000-memory.dmp
    .exe windows x86


    Headers

    Sections