General

  • Target

    1680-1266-0x0000000000400000-0x000000000055E000-memory.dmp

  • Size

    1.4MB

  • MD5

    0d21b9aec37ed4f10b2dc26cf17713d0

  • SHA1

    15d4fedd8c9f38f5adfc29c30a20a7c61090a371

  • SHA256

    d8d11a31542f781ef8de1a466d380de086bd7f6b1e65d03ef85da52688c0fbd6

  • SHA512

    3f0190b0c4f4e2d6c5a52b4f3f4c66c47a0ffc7b0cacc4adf436b878a860a1a23309be83135d05e72b5df8069564f7dd8353d67faad6cd9fd8e6b7c8e7d44d09

  • SSDEEP

    3072:4NLOpnhTdOw9YAJOzIY3gVl01T2ENipdDD0z5:4NLYdT97JSIPl0QENqg

Score
10/10

Malware Config

Extracted

Family

warzonerat

C2

62.102.148.185:64544

Signatures

  • Warzone RAT payload 1 IoCs
  • Warzonerat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1680-1266-0x0000000000400000-0x000000000055E000-memory.dmp
    .exe windows x86


    Headers

    Sections