General

  • Target

    1156-57-0x00000000005C0000-0x000000000071C000-memory.dmp

  • Size

    1.4MB

  • MD5

    a0e93c3212e3eda93e160fa47c7105b4

  • SHA1

    ddf3b10829abbe978e5e03a8af987e1448f6a736

  • SHA256

    7a7cd5f20dbec498324601b2a8ca01ce39b767f1481c82b23a1f9e54fc961577

  • SHA512

    70c34b978d90fe210647bb1daf1b872145ee6199ce04844cb6facd2ccace192cb98d963ea715125eb7f477a79ed09f22aed1f9d6c3ca26385619c7d8e2efbfc1

  • SSDEEP

    3072:+ZaCH2bX+Oi31TVMZe9BnNw35iS3aOXh4T4rYzHuG0OIwj:+ZVRtF6ePnNwEYSTWYzOG0hwj

Score
10/10

Malware Config

Extracted

Family

warzonerat

C2

testing1212.ddns.net:5201

Signatures

  • Warzone RAT payload 1 IoCs
  • Warzonerat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1156-57-0x00000000005C0000-0x000000000071C000-memory.dmp
    .exe windows x86


    Headers

    Sections