General

  • Target

    4068-49-0x0000000000400000-0x0000000001400000-memory.dmp

  • Size

    16.0MB

  • MD5

    2079f373bdfda1df24e2085e0b9c8da9

  • SHA1

    ae6248b7a3a701dade02fbbb358024f034a77db3

  • SHA256

    a40d4598b21b0ea5d9b75cfc2241eea3b348e297366ed5b1afcfaa0540c9fc68

  • SHA512

    49a1f9be24f9926ead13a9a090ac85061818d24d017c12305719da9bbf84b847056debce24d8aaf14c0eca632b5e36cdef6dabe30c647083967059db5ef5d349

  • SSDEEP

    12288:KwqYSESaeuCdmdV3OwYIdCNWqjLj+m55CND1mlmQiZq:KwRSESaepd83lCNWyx5doFZ

Score
10/10

Malware Config

Extracted

Family

warzonerat

C2

zakriexports.com:2017

Signatures

  • Warzone RAT payload 1 IoCs
  • Warzonerat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4068-49-0x0000000000400000-0x0000000001400000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections