Static task
static1
Behavioral task
behavioral1
Sample
valorant_20.34_28.06.2023.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
valorant_20.34_28.06.2023.exe
Resource
win10v2004-20230703-en
General
-
Target
valorant_20.34_28.06.2023.exe
-
Size
13.9MB
-
MD5
eb48003871f6ba015b83f4e4ff446f5c
-
SHA1
8a24de930a2abd00b9178dbfc9df43cb068ac828
-
SHA256
cdb7aeb0d56239a4b502be318375e696569c021e29c17a7c9201b1b1e717c634
-
SHA512
779d028d7cb1fc0a2c6db607b66e9a4d78458dc2b612aa5ca93984dd7190ee243888213db9b5dcec1d84c3ce3163430b82ed64c802f6b599f62a7a2ae3b05d94
-
SSDEEP
393216:FF8qApo+GZu4Nfm1/nXp4A85dDsdHAN5Rjeu3YiX:9XRs5R852+8OYi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource valorant_20.34_28.06.2023.exe
Files
-
valorant_20.34_28.06.2023.exe.exe windows x64
1c9e07af67348622700778228d2e8f08
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetSystemTimeAsFileTime
LocalAlloc
LocalFree
GetModuleFileNameW
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
CharUpperBuffW
Sections
.text Size: - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 768B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 5.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 492B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_0 Size: - Virtual size: 6.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
_1 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_2 Size: 13.8MB - Virtual size: 13.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 106KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ