General

  • Target

    3064-9-0x0000000000400000-0x0000000000554000-memory.dmp

  • Size

    1.3MB

  • MD5

    bb7f1f8e022c274e0214be6f5d0dab8a

  • SHA1

    3a87f52eab3a6f483159abae7477b916e755ab5f

  • SHA256

    a3089a1bf2dc2b75c29d01f3b8e8b556a9b195ad2e927f4061814e6a3f708450

  • SHA512

    07a855cf8091915cd2ff1cbc8a93c4c79bc482b58b6b73e8665533f45293742e8bfc2e25cb7e73e065dac885169239f11032b43414b7419835ab1263e3a44a2d

  • SSDEEP

    1536:h0jP7/L1B5rVmN8sxHv2M28ix8EUaJxWXB4u0OVE01:K1VmhaH8EFvWX0OVE0

Score
10/10

Malware Config

Extracted

Family

warzonerat

C2

satgobleien.jumpingcrab.com:5201

Signatures

  • Warzone RAT payload 1 IoCs
  • Warzonerat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3064-9-0x0000000000400000-0x0000000000554000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections