General
-
Target
Valorant spoofer.bat
-
Size
13.4MB
-
Sample
230608-gq5vfsdd5x
-
MD5
1a8d2cd894a710d0eafa0675567614e0
-
SHA1
1ae02eb9bc479fa1293aaa72e6f91f99454a1b46
-
SHA256
ada1cd535f15add50deb5bc5282196d4530b5cd399ccd196ee9069483cba4904
-
SHA512
13d30df57e01f7d2281d4b6d5017d1ac63eba2b932637dd4db839050ed7ecff672e46208633f40130bb6a018aa5582dc2046c4b7c0ded4fa637e41aa837dd298
-
SSDEEP
49152:ku8ZwakWtzSnmpvGaFMfklWzAe0NAkbp1iEE1m4bK8QpVkmrFQZM8BpThDz+y3Hl:3
Static task
static1
Behavioral task
behavioral1
Sample
Valorant spoofer.bat
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
Valorant spoofer.bat
-
Size
13.4MB
-
MD5
1a8d2cd894a710d0eafa0675567614e0
-
SHA1
1ae02eb9bc479fa1293aaa72e6f91f99454a1b46
-
SHA256
ada1cd535f15add50deb5bc5282196d4530b5cd399ccd196ee9069483cba4904
-
SHA512
13d30df57e01f7d2281d4b6d5017d1ac63eba2b932637dd4db839050ed7ecff672e46208633f40130bb6a018aa5582dc2046c4b7c0ded4fa637e41aa837dd298
-
SSDEEP
49152:ku8ZwakWtzSnmpvGaFMfklWzAe0NAkbp1iEE1m4bK8QpVkmrFQZM8BpThDz+y3Hl:3
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Executes dropped EXE
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-