General

  • Target

    4136-141-0x0000000005190000-0x00000000052EC000-memory.dmp

  • Size

    1.4MB

  • MD5

    d3c51491d64bfb0a3e2a0d7bea7dc2be

  • SHA1

    a26f9368a6d04095fa7c593cebbc89f25d2e565e

  • SHA256

    ba9048a29ddaaecd4615c5036bb87ab047eef33095cb71cde95c080f9e46c3bf

  • SHA512

    923edf296f911c26876f98d649e7023cf0d666007c0d9ae6a4709dc1df6fd0fd37ec9156813abd0f8fb6df5e42945299f6e2a880e823db03ffadc17dbcdd97f3

  • SSDEEP

    3072:wY6yLeO0NaOZQAf/XziJ9pvPyu3rlkdacYzH+G0OIwj:w3rA9AnziJydacYzeG0hwj

Score
10/10

Malware Config

Extracted

Family

warzonerat

C2

ugoguy01.ddns.net:5656

Signatures

  • Warzone RAT payload 1 IoCs
  • Warzonerat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4136-141-0x0000000005190000-0x00000000052EC000-memory.dmp
    .exe windows x86


    Headers

    Sections