General

  • Target

    1284-62-0x0000000000400000-0x000000000041D000-memory.dmp

  • Size

    116KB

  • MD5

    fa16cccc54249f0a83cd175eae61150d

  • SHA1

    15d119d948e98b249a9996327d563ecc7a2d1a67

  • SHA256

    f5a44571a5a962e531d3c70c71a649add1df4c0ce02521ef8b35215c64ee75de

  • SHA512

    4007391910a141bf8a1a80276befd483895fd293744711a7563870414fb6fd9c19cdf61cf2bbf47e87d2e0882c3510a9fe349501a62a14999baf0445cc6433e8

  • SSDEEP

    1536:5Csejmb+6BQyusX1UjtA0uWRf/eloc/9T1jVEyp:AtD6jSm0uWRfCogTjVEG

Score
10/10

Malware Config

Extracted

Family

warzonerat

C2

killabean.duckdns.org:3203

Signatures

  • Warzone RAT payload 1 IoCs
  • Warzonerat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1284-62-0x0000000000400000-0x000000000041D000-memory.dmp
    .exe windows x86


    Headers

    Sections