General

  • Target

    572-62-0x0000000000400000-0x000000000041D000-memory.dmp

  • Size

    116KB

  • MD5

    e8de76dafb8617a1513fe461a697f5c8

  • SHA1

    01107921f0a4d79f7c3002f9bc9338b5bdb46d84

  • SHA256

    c47b7185211ea863333d10b55a8a2c155c7b45c3a93267ded6be16629b08a6f8

  • SHA512

    147eb3917c0bc14d6d72cd796e73f6233bef496c0ba9779871f20204614068bc8ddfc653c3be74de7813ee4c91baec374b1eed71b34254fb6d0703dffdac8f01

  • SSDEEP

    1536:5Csejmb+6BQyusX1UjtA0uWRf/eloc/9T1jVEyp:AtD6jSm0uWRfCogTjVEG

Score
10/10

Malware Config

Extracted

Family

warzonerat

C2

jevron.duckdns.org:6060

Signatures

  • Warzone RAT payload 1 IoCs
  • Warzonerat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 572-62-0x0000000000400000-0x000000000041D000-memory.dmp
    .exe windows x86


    Headers

    Sections