General

  • Target

    576-62-0x0000000000400000-0x000000000041D000-memory.dmp

  • Size

    116KB

  • MD5

    989617a67f345b23232de699d11e2fd1

  • SHA1

    08f334e21da16cbccad0e258d48f7da915d0342d

  • SHA256

    cc3f263e4587e450c6ab89c67f47d6c1a643436343503f49bf19b765d45bacfe

  • SHA512

    98ecd80fc1182286c9090c938789e460a610cf0ef0c6e81afe2bc9b9c8e5aa975538b442befb9f392227d7bc60dd69c9d12a22da0c2985edd36c3f857767147f

  • SSDEEP

    1536:5Csejmb+6BQyusX1UjtA0uWRf/eloc/9T1jVEyp:AtD6jSm0uWRfCogTjVEG

Score
10/10

Malware Config

Extracted

Family

warzonerat

C2

jeron7.duckdns.org:2905

Signatures

  • Warzone RAT payload 1 IoCs
  • Warzonerat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 576-62-0x0000000000400000-0x000000000041D000-memory.dmp
    .exe windows x86


    Headers

    Sections