General

  • Target

    eduke32_win32_20231007-10494-17844a2f6.7z

  • Size

    4.0MB

  • MD5

    5feb96ca3bdb4605e568df3446cca74f

  • SHA1

    358ed6060e45c7371ee075b56d536252960b7002

  • SHA256

    0d5daf0db9425d3b728def97f142534b0f2cef800006945aa61904205784c118

  • SHA512

    4933b09f005372607118201d71393190fefcec8b23be05861cb1bcf5cad9ece95937358b1cb024d75bb5b3463064acee33dcc192ff2e435c5c292417f5d1f094

  • SSDEEP

    98304:iOyFIgpdQ6GK9xbJO++814X+qwoCg7Q8pcP:itFIa1xbJOKOwo68p0

Score
3/10

Malware Config

Signatures

  • Unsigned PE 3 IoCs

    Checks for missing Authenticode signature.

Files

  • eduke32_win32_20231007-10494-17844a2f6.7z
    .7z
  • SEHELP.HLP
  • STHELP.HLP
  • buildlic.txt
  • eduke32.exe
    .exe windows:4 windows x86

    2d69de3817bc19a9b635d39cb4c1dc1e


    Headers

    Imports

    Exports

    Sections

  • gamecontrollerdb.txt
  • gpl-2.0.txt
  • m32help.hlp
  • mapster32.exe
    .exe windows:4 windows x86

    b8ddb6bd71b6ba780ed952c8a0d1aa67


    Headers

    Imports

    Exports

    Sections

  • names.h
  • samples/_clipshape0.map
  • samples/a.m32
    .vbs
  • samples/aspect.map
  • samples/dump_used_assets.m32
    .vbs
  • samples/m32script_ex.map
  • samples/mask_drawing_order.map
  • samples/r_usenewshading.map
  • samples/ror.map
  • samples/screentext.con
  • samples/splitscr.con
  • samples/spriteclip.txt
  • samples/startpos.m32
    .vbs
  • samples/test_tileoffsets.map
  • samples/tests.m32
    .vbs
  • samples/trueror1.map
  • samples/weapons.sample.con
    .vbs
  • tiles.cfg
  • voidsw.exe
    .exe windows:4 windows x86

    0b779e29e5bf763b7021348b478332cc


    Headers

    Imports

    Exports

    Sections