Behavioral task
behavioral1
Sample
4068-49-0x0000000000400000-0x0000000001400000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4068-49-0x0000000000400000-0x0000000001400000-memory.exe
Resource
win10v2004-20240221-en
General
-
Target
4068-49-0x0000000000400000-0x0000000001400000-memory.dmp
-
Size
16.0MB
-
MD5
2079f373bdfda1df24e2085e0b9c8da9
-
SHA1
ae6248b7a3a701dade02fbbb358024f034a77db3
-
SHA256
a40d4598b21b0ea5d9b75cfc2241eea3b348e297366ed5b1afcfaa0540c9fc68
-
SHA512
49a1f9be24f9926ead13a9a090ac85061818d24d017c12305719da9bbf84b847056debce24d8aaf14c0eca632b5e36cdef6dabe30c647083967059db5ef5d349
-
SSDEEP
12288:KwqYSESaeuCdmdV3OwYIdCNWqjLj+m55CND1mlmQiZq:KwRSESaepd83lCNWyx5doFZ
Malware Config
Extracted
warzonerat
zakriexports.com:2017
Signatures
-
Warzone RAT payload 1 IoCs
resource yara_rule sample warzonerat -
Warzonerat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4068-49-0x0000000000400000-0x0000000001400000-memory.dmp
Files
-
4068-49-0x0000000000400000-0x0000000001400000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.bss Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ