Resubmissions

10-02-2023 16:09

230210-tl8rrshf92 10

10-02-2023 16:01

230210-tgqqdshd57 10

General

  • Target

    Dragon Ball Z Kakarot v1.03-v1.60 Plus 32 Trainer.exe

  • Size

    1.3MB

  • MD5

    5976447d2d9d6aca7e3df4bc0d27bfe7

  • SHA1

    0a137d372e3123713f7c690fa2831de162ae69c8

  • SHA256

    a9ac519ca396e0878eb15b11d7c697bc175f380b00162f4cb351239353747d3a

  • SHA512

    6eca409e1053b23f3affc9d2d7f562ddae0c60de55183ae82b1098c896f7d1b48fa12ed39c96b0f4ca8a06ddd7aae22dbd2003b2389793a702d32528afeefa87

  • SSDEEP

    24576:NkwWyiqAVWAvGNYn3rJ4FJXFtspAyji8GbJ7NDSIWC1:LuVuOnN4oALFV7bWC1

Score
10/10
r77

Malware Config

Signatures

  • R77 family
  • r77 rootkit payload 1 IoCs

    Detects the payload of the r77 rootkit.

Files

  • Dragon Ball Z Kakarot v1.03-v1.60 Plus 32 Trainer.exe
    .exe windows x64

    cf68394e6217c2041e6113c35a9269c6


    Headers

    Imports

    Sections