General

  • Target

    1364-1104-0x0000000000400000-0x000000000055E000-memory.dmp

  • Size

    1.4MB

  • MD5

    ce032c1a9b8fe37c4b771711e9fdc010

  • SHA1

    885a0a328f1b6f202207717b500206c9c815cb4f

  • SHA256

    ffcdc95698aa0ed2c26e21a431cbfc0e4e436af5654f7a431cf4f586a121f895

  • SHA512

    5fec5965c8db9fff93c8c93e9d1c50741cd42aab1394b0d96ce5837ff7aba542ec9682e442e957b315a510a0261567d3e1b489e2c0a104b1226361608d7538d1

  • SSDEEP

    3072:4NLOpnhTdOw9YAJOzIYwgVl01T2ENipdDS0z5:4NLYdT97JSISl0QENqH

Score
10/10

Malware Config

Extracted

Family

warzonerat

C2

62.102.148.158:62641

Signatures

  • Warzone RAT payload 1 IoCs
  • Warzonerat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1364-1104-0x0000000000400000-0x000000000055E000-memory.dmp
    .exe windows x86


    Headers

    Sections