General

  • Target

    4644-159-0x0000000000400000-0x0000000000554000-memory.dmp

  • Size

    1.3MB

  • MD5

    06c74456f9f015947f2cb946b7ce2398

  • SHA1

    4ef03f978d6c49938fd0197ba11621617864d86f

  • SHA256

    0c46e69cc33328bfb34b967207ade499aed283e1f4740f57b9c29a47301bc05e

  • SHA512

    d48f38c606129d5857d3b356f4f6602d1e669000a3795c54a0f8c259e70067fa78bc15518fae118ecb3b1287ae78f50b0844df51c7a80a56cf88738b2c9ad87a

  • SSDEEP

    1536:h0jP7/L1B5rVmN8sxHv2M28ix8EUaJxWZoB4u0OVE01:K1VmhaH8EFvW+0OVE0

Score
10/10

Malware Config

Extracted

Family

warzonerat

C2

161.129.33.242:4567

Signatures

  • Warzone RAT payload 1 IoCs
  • Warzonerat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4644-159-0x0000000000400000-0x0000000000554000-memory.dmp
    .exe windows x86


    Headers

    Sections