General

  • Target

    2032-50-0x0000000000400000-0x0000000000554000-memory.dmp

  • Size

    1.3MB

  • MD5

    66f99e6929224fc0b53be5a9a7a1abe1

  • SHA1

    1bf35e3cc61049d69d6855aecc59d1b935f08395

  • SHA256

    65a82dc4d6c4c439c3946f6d188f52621cadf8bad60e19e19ee1de584f092cff

  • SHA512

    7dba786ce9c9f3636c595b48055003e38355b799a999d859d7031dd83052c73be862678a78b00cad408a0e02b30d3c0d13b947f692172340156362fef4e4707a

  • SSDEEP

    1536:h0jP7/L1B5rVmN8sxHv2M28ix8EUaJxWZoB4u0OVE01:K1VmhaH8EFvW+0OVE0

Score
10/10

Malware Config

Extracted

Family

warzonerat

C2

satgobleien.jumpingcrab.com:5201

Signatures

  • Warzone RAT payload 1 IoCs
  • Warzonerat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2032-50-0x0000000000400000-0x0000000000554000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections