Static task
static1
Behavioral task
behavioral1
Sample
clear.bat
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
clear.bat
Resource
win10v2004-20240226-en
General
-
Target
Spoofer.zip
-
Size
68.0MB
-
MD5
3f1376d6ca096390943dc9a074b4bf8a
-
SHA1
159d06f86a337e77cc258666118a041b43c4fdfe
-
SHA256
dd4a97d702e237afd3df64f3d1ec5286626601160e25a599d918dd38cd2d8b27
-
SHA512
0dcad9bd0f303b44d889be40a6f26cca1bbba46cb2c8b834f99640dc5a62d953c48a85be02c3e27a044eaff9f58293461458c12414189451388a69ebd83d07e8
-
SSDEEP
1572864:Gl6WOvnf/RSMNFr3UxKXykC6c2V3i25Vb02aIng:GW3JFrExKXyu8OO2az
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/trigger.dll
Files
-
Spoofer.zip.zip
Password: thuanthu
-
Evitar Ban.txt
-
ativar spoofer.reg
-
clear.bat
-
desativar spoofer.reg
-
dlls/sys.dll
-
dlls/trii.dll
-
trigger.dll.exe windows:4 windows x86 arch:x86
Password: thuanthu
6f462fcc6b830b77fb3fef2add9dc570
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
msvcrt
malloc
_sleep
memset
strcmp
strcpy
getenv
sprintf
fopen
fwrite
fclose
__argc
__argv
_environ
_XcptFilter
__set_app_type
_controlfp
__getmainargs
exit
shell32
ShellExecuteA
kernel32
SetUnhandledExceptionFilter
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 70.9MB - Virtual size: 70.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 4B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 776B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ