Static task
static1
Behavioral task
behavioral1
Sample
Valorant Bhop + Triggerbot.rar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Valorant Bhop + Triggerbot.rar
Resource
win10v2004-20240221-en
Behavioral task
behavioral3
Sample
Valorant Bhop + Triggerbot.exe
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
Valorant Bhop + Triggerbot.exe
Resource
win10v2004-20240221-en
General
-
Target
Valorant Bhop + Triggerbot.rar
-
Size
306KB
-
MD5
c7f9e15d442b9f91fd6d38b32d148c95
-
SHA1
fa273430829424b1751324e48d7926c543313cd2
-
SHA256
61e233c1860013e94c037f609c5079ca54a8d434df561ca59f28f8050f5594bc
-
SHA512
e180bdcf301af6f7da06178f81ab7b4c5d0d09d69af2ea0db6c69171c4f452bb71936dd6369a72a7238e69b11648603bcfcde02e3c0793b3331970d3c9c3200e
-
SSDEEP
6144:d7n6wjlZuoQVYnat6TWJbEuZ+w3s5IoZ4H1Ax0fsYhloajixdiu4P6P+:djJjlZuoegZWJQuZ+ws55Z4b3hKnfC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/Valorant Bhop + Triggerbot.exe
Files
-
Valorant Bhop + Triggerbot.rar.rar
-
Valorant Bhop + Triggerbot.exe.exe windows:5 windows x86 arch:x86
aca35d13adb97d2c480a39887a5f629a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetModuleHandleA
GetProcAddress
wsock32
gethostbyname
winmm
mixerOpen
version
VerQueryValueA
comctl32
ord6
psapi
GetModuleBaseNameA
wininet
InternetOpenA
user32
GetDC
gdi32
BitBlt
comdlg32
GetSaveFileNameA
advapi32
RegCloseKey
shell32
DragFinish
ole32
CoGetObject
oleaut32
SafeArrayGetLBound
Sections
.MPRESS1 Size: 297KB - Virtual size: 788KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.MPRESS2 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE