General

  • Target

    1932-57-0x0000000000150000-0x00000000002AC000-memory.dmp

  • Size

    1.4MB

  • MD5

    0fa8909bc62ae2549a09d52d11e51860

  • SHA1

    0888a1fb2575053b8fd66bf72b3e42d71e922d27

  • SHA256

    cc2392c1e8c4758d6d5bf968c0cad22227142e5afcb421adb89aa1786656ad66

  • SHA512

    cb10739305cc239459bb16f88323a5ce35b52d52aa6720c2f257173b4a340fabb2c591fce30df6eb1442f765ffc4af5ea8d11b92a266d0a0b3a769346bec2a3e

  • SSDEEP

    3072:S6rVZN+OvhGHGll8/m2jG7hXgaNO+FhHfzYzHzG01Iwj:SAqwllcBy7lJH7YzTG0Swj

Score
10/10

Malware Config

Extracted

Family

warzonerat

C2

testing1212.ddns.net:5201

Signatures

  • Warzone RAT payload 1 IoCs
  • Warzonerat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1932-57-0x0000000000150000-0x00000000002AC000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections