Behavioral task
behavioral1
Sample
1788-54-0x0000000002900000-0x0000000002A5D000-memory.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1788-54-0x0000000002900000-0x0000000002A5D000-memory.dll
Resource
win10v2004-20240226-en
General
-
Target
1788-54-0x0000000002900000-0x0000000002A5D000-memory.dmp
-
Size
1.4MB
-
MD5
74e6e33fb301c771fb20270d4e4561e9
-
SHA1
f3c03244232a359ce410c2604493ea79201f4581
-
SHA256
efca7c285b5c7dc79e249bb74a9ce298be7b0316d97a5425b56001fdb5beedb5
-
SHA512
747d0fbd56c8f3782f01e900cc937a6cb88d7ee35b10eb27802f7b3704cce415672c3c2bb3b50f3075aa90e31ded79e325573ec05283319fa080f04fc2b5d644
-
SSDEEP
3072:ZGcMwWEOsHOpInCBor9u1uTp3YVtYGZAUOz3DVBSYzHYG08Iw:ZXPupzog1uMcz3DVBSYz4G0zw
Malware Config
Extracted
warzonerat
190.2.142.239:5566
Signatures
-
Warzone RAT payload 1 IoCs
resource yara_rule sample warzonerat -
Warzonerat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1788-54-0x0000000002900000-0x0000000002A5D000-memory.dmp
Files
-
1788-54-0x0000000002900000-0x0000000002A5D000-memory.dmp.dll windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Sections
.text Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.bss Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ