General

  • Target

    1164-141-0x00000000013C0000-0x00000000023C0000-memory.dmp

  • Size

    16.0MB

  • MD5

    706c0a0e8ff2657d56e0152c5d3ab2fe

  • SHA1

    59cfd3a237547d5c020126e4c328b8a43308e36e

  • SHA256

    97b7f74b641c0c95b12dedef6353fe5acfe43c4f88fe76ef9d890de68b5b3738

  • SHA512

    df17181f2b9d67745d9eaf3f69e36e38f83180c6fd5e3c771757ddf617980dd7d06249a36d6d77c5f46d016db48f776bd028d4fbb03f4af44d90f19b61ca7213

  • SSDEEP

    3072:m0s8jr4Mgt4HNkfk5PJURHLuWw5Cz4ULTga:mer4FtgkABU9CZCzrLTga

Score
10/10

Malware Config

Extracted

Family

warzonerat

C2

htajsjdh3738828e8dhdjjccbnc.duckdns.org:5574

Signatures

  • Warzone RAT payload 1 IoCs
  • Warzonerat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1164-141-0x00000000013C0000-0x00000000023C0000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections