General

  • Target

    Dragon Ball Z Kakarot v1.03-v2.10 Plus 32 Trainer.exe

  • Size

    1.3MB

  • MD5

    5eddb39c93f94f32d3cc032e44ad66e0

  • SHA1

    8e0f67182be0bcf6e25c703df2865edfff0d4cd1

  • SHA256

    570cccf3c4a0422bdf3173edcbd7ccbcc1c432a5c8d842b127f407e5742eb901

  • SHA512

    8d43cf9d0d502bd82d986147664a1fc541ee2b64e872c92495f31eb45af7320302a66f4a02755bd266e2ba054ae06a899dc281abd63236e52f90140f5b45c51d

  • SSDEEP

    24576:Bv4D47npBuZ6nw+7eEaHMrIyaTDSVXT5X3jxu:B6wnpBuZ6w+yF1wXT5Xzxu

Score
10/10
r77

Malware Config

Signatures

  • R77 family
  • r77 rootkit payload 1 IoCs

    Detects the payload of the r77 rootkit.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Dragon Ball Z Kakarot v1.03-v2.10 Plus 32 Trainer.exe
    .exe windows:6 windows x64 arch:x64

    b998706cea5c85c9678d039fa3e5a9ca


    Headers

    Imports

    Sections