General

  • Target

    2080-11-0x0000000000080000-0x00000000001DC000-memory.dmp

  • Size

    1.4MB

  • MD5

    5c2c609d8d4abf0c1ba8686f100e3d47

  • SHA1

    29fe91fcff96bdd875daebaf644708b5d6b4cd41

  • SHA256

    388e8bb3d58d8fb05fd4b4a9e5421501e6bad003dd1ff47955eee7eefe4194ca

  • SHA512

    9d8b5cc254b7b4075a871a9abe30ba73623755391f58b4c58711f4e007cc22223bb1fa7e7839a500728f94ca81e3741aaefd6a95c6410f9cfb31104ae7fb0cb1

  • SSDEEP

    3072:tajHd+OXh5cONNU/Razx3XF+2F5XSEYzHLG0NIwj:tRobZN0RazFBXSEYzrG0qwj

Score
10/10

Malware Config

Extracted

Family

warzonerat

C2

64.188.20.119:5200

Signatures

  • Warzone RAT payload 1 IoCs
  • Warzonerat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2080-11-0x0000000000080000-0x00000000001DC000-memory.dmp
    .exe windows:6 windows x86


    Headers

    Sections