General

  • Target

    4940-140-0x0000000000400000-0x000000000041D000-memory.dmp

  • Size

    116KB

  • MD5

    b1468a53c8688009a44b0954228c2d1b

  • SHA1

    ccaeb84b27f251b2a64fc42a121cfc2a5b0e32c0

  • SHA256

    72f80d44b843b47150522060681d15ec8108d00daf3040358cd47726356a9240

  • SHA512

    a16e2ab3f670e8a38e61e1fa400bd6b9985e9c87bb264872889a557fe66f194040ab8a1b421bbb7a2f4778e69b85539d347cc6739225246fe0c8fca0f60d384c

  • SSDEEP

    1536:5Csejmb+6BQyusX1UjtA0uWRf/eloc/9T1jVEyp:AtD6jSm0uWRfCogTjVEG

Score
10/10

Malware Config

Extracted

Family

warzonerat

C2

instac.duckdns.org:7722

Signatures

  • Warzone RAT payload 1 IoCs
  • Warzonerat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4940-140-0x0000000000400000-0x000000000041D000-memory.dmp
    .exe windows x86


    Headers

    Sections