Static task
static1
Behavioral task
behavioral1
Sample
Redragon K630RGB.exe
Resource
win10v2004-20231023-en
General
-
Target
Redragon K630RGB.exe
-
Size
5.4MB
-
MD5
f43d545ff7b4f38313212f30114d7c62
-
SHA1
84848dd6b0735eb19f27002f700b7d4d811b5501
-
SHA256
246f1dbfde08b40348ddf8c4d5b12bc5f8bd1391366809b188e85e086dcff02c
-
SHA512
ae051b47070c074be7860122fec08a5e21d2af8be7cadf8f8fafd177b5b93cb6dba7a85e83a60b06d77e9935a7e9712ec1845260e37902c939ce7b3abc71e5b5
-
SSDEEP
98304:Mj8w1b2sn6foZ2RdsX3eyhwMbe83txarJXj7PbbMNhNk1kc1N:MQs6wZ2R7r83bEJboNhWkc1N
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Redragon K630RGB.exe
Files
-
Redragon K630RGB.exe.exe windows:4 windows x86
5fca7f0fc8c16d55fed0e805fc0ad295
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord17
kernel32
GetSystemInfo
CreateFileMappingA
VirtualQuery
CompareStringA
CreateDirectoryA
GetFileSize
LoadLibraryExA
CompareStringW
GlobalSize
FreeResource
VirtualFree
GetCurrentProcess
HeapDestroy
DuplicateHandle
GetThreadContext
VirtualProtectEx
WriteProcessMemory
FlushInstructionCache
SetThreadContext
ResumeThread
GetLastError
MapViewOfFile
DeleteFileA
RemoveDirectoryA
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
CreateProcessA
CloseHandle
Sleep
lstrlenA
UnmapViewOfFile
IsBadReadPtr
ReadFile
FindFirstFileA
FindClose
lstrcmpiA
lstrcpynA
WriteFile
GetDriveTypeA
SetFilePointer
GetFileAttributesA
GetPrivateProfileIntA
CreateEventA
QueryPerformanceFrequency
lstrcatA
ReleaseMutex
GetSystemDefaultLangID
CreateMutexA
SetErrorMode
GetSystemDirectoryA
MulDiv
GetPrivateProfileStringA
GetPrivateProfileSectionNamesA
FlushFileBuffers
SetStdHandle
LoadLibraryA
FreeLibrary
GetDiskFreeSpaceA
GetTickCount
FindResourceExA
GetWindowsDirectoryA
InterlockedDecrement
LocalFree
InterlockedIncrement
FormatMessageA
GetTempPathA
GetVersionExA
CreateFileA
GlobalFree
FindResourceA
LoadResource
SizeofResource
GlobalAlloc
LockResource
GlobalLock
GlobalUnlock
WaitForSingleObject
SetLastError
ExitProcess
lstrcpyA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
HeapCreate
IsBadCodePtr
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetEnvironmentVariableA
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
GetOEMCP
GetACP
GetCPInfo
GetCommandLineA
GetStartupInfoA
RaiseException
HeapAlloc
HeapFree
RtlUnwind
UnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
HeapSize
LCMapStringW
LCMapStringA
IsBadWritePtr
HeapReAlloc
SearchPathA
FindNextFileA
GetTempFileNameA
GetExitCodeProcess
OpenProcess
CompareFileTime
GetProcessTimes
TerminateProcess
GetLocalTime
InitializeCriticalSection
GetCurrentProcessId
GetVersion
LeaveCriticalSection
EnterCriticalSection
GetCurrentThread
VirtualProtect
ResetEvent
SetEvent
QueryPerformanceCounter
SystemTimeToFileTime
lstrcmpA
MoveFileExA
InterlockedExchange
DeleteCriticalSection
VirtualAlloc
user32
WaitForInputIdle
CharUpperA
wsprintfA
MessageBoxA
DialogBoxIndirectParamA
SetDlgItemTextA
SetWindowLongA
SetFocus
BeginPaint
EndPaint
LoadStringA
FillRect
ScreenToClient
SendDlgItemMessageA
GetMessageA
DefWindowProcA
GetParent
GetWindow
SystemParametersInfoA
MsgWaitForMultipleObjects
GetWindowDC
UpdateWindow
InvalidateRect
DrawIcon
MapDialogRect
GetClassNameA
CallWindowProcA
DrawFocusRect
InflateRect
DrawTextA
GetWindowTextA
CopyRect
EnumChildWindows
CreateWindowExA
RegisterClassExA
IntersectRect
GetDlgItemTextA
MapWindowPoints
SetWindowPos
GetPropA
EnableMenuItem
SetPropA
RemovePropA
ShowWindow
IsWindow
GetSysColor
LoadImageA
CreateDialogParamA
GetDC
ReleaseDC
SetActiveWindow
PeekMessageA
IsDialogMessageA
TranslateMessage
DispatchMessageA
DestroyWindow
CreateDialogIndirectParamA
SetForegroundWindow
GetDesktopWindow
GetClientRect
EnableWindow
IsWindowEnabled
GetWindowLongA
GetWindowRect
MoveWindow
EndDialog
LoadIconA
GetDlgItem
SendMessageA
SetWindowTextA
gdi32
SetBkMode
SetTextColor
TextOutA
RestoreDC
CreateFontIndirectA
SetBkColor
CreateRectRgn
DeleteObject
CreateSolidBrush
GetDIBColorTable
GetSystemPaletteEntries
CreatePalette
CreateHalftonePalette
GetDeviceCaps
GetObjectA
CreateCompatibleDC
UnrealizeObject
SelectPalette
RealizePalette
SelectObject
BitBlt
DeleteDC
CreateDIBitmap
CreateCompatibleBitmap
CreateDCA
GetStockObject
GetTextExtentPoint32A
CreatePatternBrush
DeleteMetaFile
SetMetaFileBitsEx
SetStretchBltMode
SelectClipRgn
SetPixel
PatBlt
PlayMetaFile
StretchBlt
CreateBitmap
SetViewportExtEx
SetViewportOrgEx
SetWindowExtEx
SetWindowOrgEx
SetMapMode
SaveDC
advapi32
OpenProcessToken
InitializeSecurityDescriptor
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
SetSecurityDescriptorDacl
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegEnumKeyExA
RegEnumKeyA
RegOpenKeyA
FreeSid
EqualSid
AllocateAndInitializeSid
GetTokenInformation
OpenThreadToken
ole32
CoInitializeSecurity
CoInitialize
CoUninitialize
oleaut32
VariantChangeType
VariantClear
SysStringLen
SysReAllocStringLen
SysAllocStringLen
SysAllocString
SysFreeString
GetErrorInfo
lz32
LZOpenFileA
LZCopy
LZClose
rpcrt4
UuidCreate
RpcStringFreeA
UuidToStringA
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
shell32
SHGetSpecialFolderLocation
ShellExecuteExA
SHGetMalloc
SHGetPathFromIDListA
Sections
.text Size: 288KB - Virtual size: 284KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 368KB - Virtual size: 365KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ