MalwareBazaar Database

This page shows some basic information the YARA rule APT_IN_TA397_wmRAT including corresponding malware samples.

Database Entry


YARA Rule:APT_IN_TA397_wmRAT
Author:Proofpoint
Description:track wmRAT based on socket usage, odd error handling, and reused strings
Firstseen:2025-11-24 16:36:48 UTC
Lastseen:2026-02-27 07:43:39 UTC
Sightings:3

Malware Samples


The table below shows all malware samples that matching this particular YARA rule (max 1000).

Firstseen (UTC)SHA256 hashTagsSignatureReporter