General

  • Target

    316-78-0x0000000000400000-0x000000000041D000-memory.dmp

  • Size

    116KB

  • MD5

    048186b3d12421cb4bd324a02a216509

  • SHA1

    eda9a777394a845c459a1eedf701f614abcc571d

  • SHA256

    291614d70b59707032d79c23be994928d8fd66d4ef6af90b52e4056a2c269dae

  • SHA512

    eb664328fc3e257ae2fa59554720aedc7e3fc0922eba81ccf2fb5047fbe6dca3d1dbe7afeaa8ca2b98432b00f833f75678095ecb39868604cb900516abeed1b4

  • SSDEEP

    1536:5Csejmb+6BQyusX1UjtA0uWRf/eloc/9T1jVEyp:AtD6jSm0uWRfCogTjVEG

Score
10/10

Malware Config

Extracted

Family

warzonerat

C2

avarian717.duckdns.org:5050

Signatures

  • Warzone RAT payload 1 IoCs
  • Warzonerat family

Files

  • 316-78-0x0000000000400000-0x000000000041D000-memory.dmp
    .exe windows x86


    Headers

    Sections