General

  • Target

    1620-41-0x0000000000400000-0x000000000055A000-memory.dmp

  • Size

    1.4MB

  • MD5

    0370ea727029f7f1b7b41da5d1573ac7

  • SHA1

    42258529207f1cc630aba760a6ad0b6b048fe96c

  • SHA256

    df3e3dc90f827da39256f88eee69836ba258c3bd241ca49e7d0146e9b3a3bb1b

  • SHA512

    06b9dcbdbe58671947bfbdef01025ea05c5467fd5aa0e01d21dcb5a6f77cb82f43ca4301314c5df3b5191a26a6b3716881da24e844df93770cd92ef04bc7c8c8

  • SSDEEP

    3072:K7W9jps0Tx4azG6GweOTir5axbjNCz45LT7a:KwpsERzGKurEXCzeLT7a

Score
10/10

Malware Config

Extracted

Family

warzonerat

C2

grotomniponmyte.sytes.net:5203

Signatures

  • Warzone RAT payload 1 IoCs
  • Warzonerat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1620-41-0x0000000000400000-0x000000000055A000-memory.dmp
    .exe windows x86


    Headers

    Sections