Behavioral task
behavioral1
Sample
c434b38040123658d8d128523679b228.exe
Resource
win7-20231129-en
General
-
Target
c434b38040123658d8d128523679b228
-
Size
269KB
-
MD5
c434b38040123658d8d128523679b228
-
SHA1
8695122058bf808c11844dbbff16939bd1e676e7
-
SHA256
e036d16a53d179cf0b5e858fde2e96ddba3befe70cb12506d4a5950fa57e23ba
-
SHA512
a73e0d5ee8659dadaac18264aea341cdcc2872981fa29032353c2e90b4922aa02052ed063145ce4124ec7f73febf63c54f7bd30bc67cab8f82301082208477f5
-
SSDEEP
6144:Bhd+/cALHzDLqiRTON/vY47++t1MC4R/utYa99S2UH8:LdmLH3LqiR+X7vdEW6a99E8
Malware Config
Extracted
growtopia
https://discord.com/api/webhooks/885449685890899969/ygHzdLn35SVAO5CBlQh_Ygsr4OsM5Hag8mgXN7c5_FQPmXVx-XTGCQbdUv9K04fCR5n8
-
payload_url
https://cdn.discordapp.com/attachments/819331742212161576/877226130640343090/newlog.gif
https://cdn.discordapp.com/attachments/819331742212161576/877227264864055327/clipboard.gif
https://cdn.discordapp.com/attachments/819331742212161576/877216643896459294/clipboard.gif
https://cdn.discordapp.com/attachments/819331742212161576/877223646391844904/savedat.gif
https://cdn.discordapp.com/attachments/819331742212161576/877225829988438026/growtopia.gif
Signatures
-
Growtopia family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource c434b38040123658d8d128523679b228
Files
-
c434b38040123658d8d128523679b228.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mscoree
_CorExeMain
Sections
.text Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 223KB - Virtual size: 223KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ