General

  • Target

    2044-63-0x0000000000400000-0x000000000041D000-memory.dmp

  • Size

    116KB

  • MD5

    acffb6918fc816c779963fc0449583e4

  • SHA1

    b2c60ddf31107a07795e48b8a1b3002a6eaa92c9

  • SHA256

    870c056f03ab12e9bfa28794387cc41f7e2d176c80c71236124cc054722cfcec

  • SHA512

    aa227fc4f333741e1d9a09b08f0dfd5fb0171f6c893ff3cf2c988356120f914a0bbb9b9d2d0ad577d2482c875db99cdeb778d1aebaabbe96c4303d274b122cfd

  • SSDEEP

    1536:5Csejmb+6BQyusX1UjtA0uWRf/eloc/9T1jVEyp:AtD6jSm0uWRfCogTjVEG

Score
10/10

Malware Config

Extracted

Family

warzonerat

C2

healings.duckdns.org:7722

Signatures

  • Warzone RAT payload 1 IoCs
  • Warzonerat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2044-63-0x0000000000400000-0x000000000041D000-memory.dmp
    .exe windows x86


    Headers

    Sections