Static task
static1
Behavioral task
behavioral1
Sample
L4D2 Bhop/l4d2-autobhop-starter.bat
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
L4D2 Bhop/l4d2-autobhop-starter.bat
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
L4D2 Bhop/l4d2-autobhop.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
L4D2 Bhop/l4d2-autobhop.exe
Resource
win10v2004-20230220-en
General
-
Target
24a2d1c02c64efc6175baa16bf661d59.bin
-
Size
6KB
-
MD5
610ca29dfddf52ffa9d3f820a58101da
-
SHA1
80fc7b7cf883060b91acbd2baca5215fcbf44de0
-
SHA256
b66f546963eb464342970216f1533851e9b6378cc9dfce6ab9b27f02614ccbca
-
SHA512
22cf44dd4e800774e11817bf564fdaae4f3b216ecfaddaf9c09d4c6a9a6ba3e553cc8a2ddaa0243cb79c159b2b0144e66972dabe84d24b46b9e6463c3124dcef
-
SSDEEP
192:Nj/xE4uknaLAnv4rxDWYG/i+caLiixkl7f/ZC2LpNUj:5u45akvGSYG/iivI7/ZBe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack002/L4D2 Bhop/l4d2-autobhop.exe
Files
-
24a2d1c02c64efc6175baa16bf661d59.bin.zip
Password: infected
-
22fd50c39c9cf63cb23fe8cd08acbb453ffd52689447d3f5b05e6b4405079c8c.rar.rar
Password: infected
-
L4D2 Bhop/l4d2-autobhop-starter.bat
-
L4D2 Bhop/l4d2-autobhop.exe.exe windows x64
Password: infected
6781fdb39de7b4765f1079cf4296444c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
OpenProcess
CreateToolhelp32Snapshot
Sleep
CloseHandle
ReadProcessMemory
Module32FirstW
Module32NextW
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetModuleHandleW
user32
SendMessageW
GetAsyncKeyState
GetWindowThreadProcessId
FindWindowW
vcruntime140
__current_exception
__current_exception_context
memset
__C_specific_handler
api-ms-win-crt-stdio-l1-1-0
__stdio_common_vfprintf
puts
fputs
__p__commode
__stdio_common_vsscanf
_set_fmode
__acrt_iob_func
api-ms-win-crt-runtime-l1-1-0
_c_exit
_initterm
_initialize_onexit_table
_cexit
_crt_atexit
terminate
_get_initial_narrow_environment
_initialize_narrow_environment
_register_thread_local_exe_atexit_callback
__p___argv
_initterm_e
_configure_narrow_argv
_register_onexit_function
_set_app_type
_exit
_seh_filter_exe
exit
__p___argc
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-heap-l1-1-0
_set_new_mode
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 504B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 44B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ