General

  • Target

    5092-738-0x0000000000400000-0x000000000041D000-memory.dmp

  • Size

    116KB

  • MD5

    b6b01ef87a9f7c03665aa5df961c032b

  • SHA1

    0f87e2e034483eca973ca6955e3f5dee62a6b6c3

  • SHA256

    9143ee2b850a97ac0649418e50149ef2446e171a270c504022487e1ef0ef4009

  • SHA512

    71fd7e81e4c9c5697e99f8764b79ba125cf535adfb352e66a92c60692d657e6b906105d3184637b85a198ba061885f460af39ee64e9138cffb19bb6c8b1c9727

  • SSDEEP

    1536:5Csejmb+6BQyusX1UjtA0uWRf/eloc09T1jVEya:AtD6jSm0uWRfCoHTjVEd

Score
10/10

Malware Config

Extracted

Family

warzonerat

C2

jeron7.duckdns.org:2905

Signatures

  • Warzone RAT payload 1 IoCs
  • Warzonerat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5092-738-0x0000000000400000-0x000000000041D000-memory.dmp
    .exe windows x86


    Headers

    Sections