Behavioral task
behavioral1
Sample
1908-54-0x0000000001D70000-0x0000000001ECE000-memory.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
1908-54-0x0000000001D70000-0x0000000001ECE000-memory.exe
Resource
win10v2004-20230703-en
General
-
Target
1908-54-0x0000000001D70000-0x0000000001ECE000-memory.dmp
-
Size
1.4MB
-
MD5
45e21f3c30dc10c2655f7cdfba394012
-
SHA1
d6d15ffebee9cff8de567e1e4458800ca89fd211
-
SHA256
4502a55ed97587348053fef27fec8009e08d302cd666ed569fd0a55f304f1edb
-
SHA512
725c754b84b31b812a028d79428bd8074da07ad88d1d7b4ee29be514955ab79ba1092010d7b967649a4e6e0f61ef824960fe1193be68263b0701eec10eb3453d
-
SSDEEP
3072:qfr0Dh99jjBgzqGZQcLgzaVl0t2ENipdDa0z5:qfrQjjBFEQkl0QENq7
Malware Config
Extracted
warzonerat
8830.sygcarpets.com:8830
Signatures
-
Warzone RAT payload 1 IoCs
resource yara_rule sample warzonerat -
Warzonerat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1908-54-0x0000000001D70000-0x0000000001ECE000-memory.dmp
Files
-
1908-54-0x0000000001D70000-0x0000000001ECE000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 42KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.bss Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ