Static task
static1
Behavioral task
behavioral1
Sample
Valorant Bhop + Triggerbot.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Valorant Bhop + Triggerbot.exe
Resource
win10v2004-20231215-en
General
-
Target
Valorant Bhop + Triggerbot.exe
-
Size
374KB
-
MD5
4ef03d56e2aeabf2c621322f12650e82
-
SHA1
1bedf180c0f8fe4f4e9d46317b037f734a67db85
-
SHA256
c179bebcc1f124291a5bd9fbc1010599cf267aac2708a732a15d66fcc8fd6dc8
-
SHA512
0bd54d442b14aec0e77d335c7fcee1a50e32bdea6b1b5c876cc8d6209f988d3744184d3520066301da4481dca02f80f68010cfc1170f4deaab16f6d63ac7766d
-
SSDEEP
6144:gCu3x6WPOlzwPwnEXCWGJMDi10G0h2ETTeQDw8mBS+PXaAN:RS/MEpDil0dTT5w8mPf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Valorant Bhop + Triggerbot.exe
Files
-
Valorant Bhop + Triggerbot.exe.exe windows:5 windows x86 arch:x86
aca35d13adb97d2c480a39887a5f629a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetModuleHandleA
GetProcAddress
wsock32
gethostbyname
winmm
mixerOpen
version
VerQueryValueA
comctl32
ord6
psapi
GetModuleBaseNameA
wininet
InternetOpenA
user32
GetDC
gdi32
BitBlt
comdlg32
GetSaveFileNameA
advapi32
RegCloseKey
shell32
DragFinish
ole32
CoGetObject
oleaut32
SafeArrayGetLBound
Sections
.MPRESS1 Size: 297KB - Virtual size: 788KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.MPRESS2 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE