General

  • Target

    Valorant spoofer.bat

  • Size

    13.4MB

  • Sample

    230608-gq5vfsdd5x

  • MD5

    1a8d2cd894a710d0eafa0675567614e0

  • SHA1

    1ae02eb9bc479fa1293aaa72e6f91f99454a1b46

  • SHA256

    ada1cd535f15add50deb5bc5282196d4530b5cd399ccd196ee9069483cba4904

  • SHA512

    13d30df57e01f7d2281d4b6d5017d1ac63eba2b932637dd4db839050ed7ecff672e46208633f40130bb6a018aa5582dc2046c4b7c0ded4fa637e41aa837dd298

  • SSDEEP

    49152:ku8ZwakWtzSnmpvGaFMfklWzAe0NAkbp1iEE1m4bK8QpVkmrFQZM8BpThDz+y3Hl:3

Score
10/10

Malware Config

Targets

    • Target

      Valorant spoofer.bat

    • Size

      13.4MB

    • MD5

      1a8d2cd894a710d0eafa0675567614e0

    • SHA1

      1ae02eb9bc479fa1293aaa72e6f91f99454a1b46

    • SHA256

      ada1cd535f15add50deb5bc5282196d4530b5cd399ccd196ee9069483cba4904

    • SHA512

      13d30df57e01f7d2281d4b6d5017d1ac63eba2b932637dd4db839050ed7ecff672e46208633f40130bb6a018aa5582dc2046c4b7c0ded4fa637e41aa837dd298

    • SSDEEP

      49152:ku8ZwakWtzSnmpvGaFMfklWzAe0NAkbp1iEE1m4bK8QpVkmrFQZM8BpThDz+y3Hl:3

    Score
    10/10
    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Tasks