Init
Behavioral task
behavioral1
Sample
BattlEye/BEServer_x86.dll
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
BattlEye/BEServer_x86.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
BattlEye/BEServer_x86.so
Resource
ubuntu1804-amd64-20231026-en
Behavioral task
behavioral4
Sample
soldatserver
Resource
ubuntu1804-amd64-20231026-en
Behavioral task
behavioral5
Sample
soldatserver.exe
Resource
win7-20231025-en
Behavioral task
behavioral6
Sample
soldatserver.exe
Resource
win10v2004-20231023-en
General
-
Target
44a4efd9d363e392a8ae98c399bbb8fbe3df681c0e1205d6eba3edde05962225.zip.zip
-
Size
792KB
-
MD5
2682326a16b4f0f6d8b0f62a39458fd8
-
SHA1
b0b2dec4f7ae9118783661a8f92dfad012c23a7f
-
SHA256
0de965da40f31c0c0feb2cb41a706160574decc7aa183330bce40fd6a7d1cb1f
-
SHA512
e209c4b50d737f8616353ea8bf50849e525b3ffa18db45925c5d237a6bb780b21d6a989c36c251c9e06d7b05bd750fe44202277e83d52bbf72475c4b9ccce1a5
-
SSDEEP
12288:qVvZFksubmYtl72xtYhw0ukqoqzq2OU81BQZN6fQbKoG3r6os9MADhHEIrq6vPu:qVxFADyMRb2DAQZs4l4rT9AN26+
Malware Config
Signatures
-
resource yara_rule static1/unpack002/soldatserver upx static1/unpack002/soldatserver.exe upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack002/BattlEye/BEServer_x86.dll unpack002/soldatserver.exe
Files
-
44a4efd9d363e392a8ae98c399bbb8fbe3df681c0e1205d6eba3edde05962225.zip.zip.zip
Password: infected
-
44a4efd9d363e392a8ae98c399bbb8fbe3df681c0e1205d6eba3edde05962225.zip.zip
-
BattlEye/BEServer_x86.dll.dll windows:4 windows x86
3e1406c872067eb220cbaa13729a12e8
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ws2_32
getservbyname
inet_addr
htonl
WSAGetLastError
connect
inet_ntoa
ioctlsocket
WSAStartup
socket
htons
WSASetLastError
gethostbyname
WSACleanup
getservbyport
closesocket
ntohs
gethostbyaddr
recv
send
__WSAFDIsSet
select
kernel32
LeaveCriticalSection
HeapSize
ReadFile
SetEndOfFile
FlushFileBuffers
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetFilePointer
InitializeCriticalSection
CreateFileA
GetLocaleInfoA
GetProcAddress
LoadLibraryA
GetSystemDirectoryA
GetModuleFileNameA
GetLongPathNameA
GetTickCount
FreeLibrary
GetLastError
HeapFree
HeapAlloc
GetCurrentThreadId
GetCommandLineA
GetVersionExA
GetProcessHeap
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EnterCriticalSection
RtlUnwind
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
CloseHandle
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
VirtualAlloc
HeapReAlloc
ExitProcess
Sleep
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
Exports
Exports
Sections
.text Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
BattlEye/BEServer_x86.so.elf linux x86
-
Changes.txt
-
readme.txt
-
server.ini
-
serverscript
-
soldatserver.elf linux x86
-
soldatserver.exe.exe windows:4 windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: - Virtual size: 7.4MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 314KB - Virtual size: 316KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE