General

  • Target

    4932-1090-0x0000000000400000-0x000000000055E000-memory.dmp

  • Size

    1.4MB

  • MD5

    ec68de4869e3af6f992a9ae2d37d4b73

  • SHA1

    939da36d8a1534af47f560aa890dd115b0327bed

  • SHA256

    f14e173d3717a706528239a5d52b736c72c98342665708361c290d31b1e9203a

  • SHA512

    516c5e226e504453f4d0a3ecf9e2d75bfa4809b1b4d6fc93e1323bd1021da9c82c6aede8633b51a9e7b4ac9c4883c1200b2b5fbc24ffe0e28fdecd47e96343c7

  • SSDEEP

    3072:4NLOpnhTdOw9YAJOzIYfgVl01T2ENipdDI0z5:4NLYdT97JSIjl0QENqd

Score
10/10

Malware Config

Extracted

Family

warzonerat

C2

62.102.148.185:64544

Signatures

  • Warzone RAT payload 1 IoCs
  • Warzonerat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4932-1090-0x0000000000400000-0x000000000055E000-memory.dmp
    .exe windows x86


    Headers

    Sections