General

  • Target

    1392-1174-0x0000000000400000-0x000000000055E000-memory.dmp

  • Size

    1.4MB

  • MD5

    a2faaaafcdd92ee6a9237228a3dbcf71

  • SHA1

    dd738f8857aad78244387fa4efd856d840cc8621

  • SHA256

    4f6111c1ede9ec4182ba1a6dcb3b0a6eee48cdec7d69a0dd4fed7fcf53ea9a9f

  • SHA512

    d077552b194c970e513339f0bd36b421fed1b19aa78bf068d20af275076ae886f04ed953c4690e11352d907530d99427010a9acbb74221ecdd19bc54acac9a0b

  • SSDEEP

    3072:4NLOpnhTdOw9YAJOzIYYgVl01T2ENipdD80z5:4NLYdT97JSIOl0QENqN

Score
10/10

Malware Config

Extracted

Family

warzonerat

C2

91.207.102.163:23795

Signatures

  • Warzone RAT payload 1 IoCs
  • Warzonerat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1392-1174-0x0000000000400000-0x000000000055E000-memory.dmp
    .exe windows x86


    Headers

    Sections