General

  • Target

    588-75-0x0000000000400000-0x0000000001462000-memory.dmp

  • Size

    16.4MB

  • MD5

    16acfac565c475ad18ac9b288d840f23

  • SHA1

    b69a0e066423405be161bcf6eb1ff10844ddecae

  • SHA256

    80036a202f265f929e91d7b43dd49322a9a3a54ea1c21fa4f644e7c4a51d3004

  • SHA512

    4543143423a8fe1b4d0b2df7f6503bad21879040edc8d32f55287b2141b3f8ea58b4fe9735aaebd73f085eb991dd6fca6b98d7b95520311c5101c24e68d23582

  • SSDEEP

    3072:2k4aHUBOO36YplMqBB3ZcPxlG+bBsDHfYzHKG0qIwj:2dx3wqz3ZcDeD/YzqG01wj

Score
10/10

Malware Config

Extracted

Family

warzonerat

C2

jabsgu.kozow.com:6186

Signatures

  • Warzone RAT payload 1 IoCs
  • Warzonerat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 588-75-0x0000000000400000-0x0000000001462000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections