General

  • Target

    4520-145-0x0000000003AA0000-0x0000000003BFA000-memory.dmp

  • Size

    1.4MB

  • MD5

    ff68fce4a89c5e37c142552921098ee1

  • SHA1

    c90f9cc3a9e51a59d88385d6b5067b0a97538697

  • SHA256

    a1c7651feadb2e46c3f93e9c2f1c3e60b950fb6a5cc31887f1f095e626778447

  • SHA512

    c584c44334d1e0edb6fb12180ec14c42a27e0d509a257c15385f51bff1162b05cbe9d03470e55b95ee0cd571b94ad99882ecf58fdc030a607e5e8a06a8ba9693

  • SSDEEP

    3072:/kuHMj/ocUk7lgfotZLxYhOipGUd8Cz4ELToa://K/o/wgwFY40d8CzXLToa

Score
10/10

Malware Config

Extracted

Family

warzonerat

C2

jeanellasimonsxxx.ddns.net:5200

Signatures

  • Warzone RAT payload 1 IoCs
  • Warzonerat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4520-145-0x0000000003AA0000-0x0000000003BFA000-memory.dmp
    .exe windows x86


    Headers

    Sections