General

  • Target

    2020-54-0x0000000000AD0000-0x0000000000C2C000-memory.dmp

  • Size

    1.4MB

  • MD5

    b5453a037fe5b320b548c849be0d85da

  • SHA1

    6f9869c0d226be10de6505c14ae973fe8076d380

  • SHA256

    2c913abea5e7df9884173a758bfd81cc56037695e2f4e2d32d6264c8a9a21446

  • SHA512

    bf6ef0884322de825816cc0271aa1e89d03aceaed752c0d4429fb856ac8ac2e6e88bc802f7788b48ab47126a78736ed6a6a193c332f1470dd956763ca1cb6202

  • SSDEEP

    3072:JGf+c/uEbjOHVwTJQLp/0EUvSNOFzFg+ziRECOrTYzHNxgGTLIw:JGmcRY6T6Lp/0EUv7zLHCOrTYzUGTEw

Score
10/10

Malware Config

Extracted

Family

warzonerat

C2

155.94.150.100:6473

Signatures

  • Warzone RAT payload 1 IoCs
  • Warzonerat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2020-54-0x0000000000AD0000-0x0000000000C2C000-memory.dmp
    .dll windows:6 windows x86 arch:x86


    Headers

    Sections