C:\Users\James\Documents\Visual Studio 2017\Projects\SharpMonoInjector\SharpMonoInjector\obj\Release\SharpMonoInjector.pdb
Static task
static1
Behavioral task
behavioral1
Sample
WareHub_Cw4ck_By_discord.gg_Recte/Execute Me In Lobby.exe
Resource
android-33-x64-arm64-20240229-en
Behavioral task
behavioral2
Sample
WareHub_Cw4ck_By_discord.gg_Recte/IGNORE-THIS-FOLDER/SharpMonoInjector.dll
Resource
android-33-x64-arm64-20240229-en
Behavioral task
behavioral3
Sample
WareHub_Cw4ck_By_discord.gg_Recte/IGNORE-THIS-FOLDER/a.exe
Resource
android-33-x64-arm64-20240229-en
Behavioral task
behavioral4
Sample
WareHub_Cw4ck_By_discord.gg_Recte/IGNORE-THIS-FOLDER/a.dll
Resource
android-33-x64-arm64-20240229-en
General
-
Target
WareHub_Cw4ck_By_discord.gg_Recte.rar
-
Size
391KB
-
MD5
b5be31ddaa79e4488dba8b78da29e6f9
-
SHA1
b6bdfe9e86c3a47edad6f39b6da364899dd8eb7b
-
SHA256
52a6bede9118bda5d1699b5f3f6f80b22808691419dd5070975621529b28de40
-
SHA512
58d11933b41f7e058bfcdffdaa372739334785ec8ebae6cc9a95a6a76163e57bf9d95fa952439ba588830500ae309cb96cb952129d05d631fd8ea99bacc0386f
-
SSDEEP
6144:0GwB357tga0fMxA13LOih8K1uLOA6fqXkkyjOthLNMV/MswK31fITnXF8Aqg0mz8:lgdxA13S68J6fGkksoNOMLRbGwxwvWc
Malware Config
Signatures
-
Unsigned PE 4 IoCs
Checks for missing Authenticode signature.
resource unpack001/WareHub_Cw4ck_By_discord.gg_Recte/Execute Me In Lobby.exe unpack001/WareHub_Cw4ck_By_discord.gg_Recte/IGNORE-THIS-FOLDER/SharpMonoInjector.dll unpack001/WareHub_Cw4ck_By_discord.gg_Recte/IGNORE-THIS-FOLDER/a.exe unpack001/WareHub_Cw4ck_By_discord.gg_Recte/IGNORE-THIS-FOLDER/a.png
Files
-
WareHub_Cw4ck_By_discord.gg_Recte.rar.rar
Password: discord.gg/Recte
-
WareHub_Cw4ck_By_discord.gg_Recte/Execute Me In Lobby.exe.exe windows:4 windows x86 arch:x86
Password: discord.gg/Recte
2c5f2513605e48f2d8ea5440a870cb9e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
wcsncmp
memmove
wcsncpy
wcsstr
_wcsnicmp
_wcsdup
free
_wcsicmp
wcslen
wcscpy
wcscmp
wcscat
memcpy
tolower
malloc
kernel32
GetModuleHandleW
HeapCreate
GetStdHandle
SetConsoleCtrlHandler
HeapDestroy
ExitProcess
WriteFile
GetTempFileNameW
LoadLibraryExW
EnumResourceTypesW
FreeLibrary
RemoveDirectoryW
EnumResourceNamesW
GetCommandLineW
LoadResource
SizeofResource
FreeResource
FindResourceW
GetNativeSystemInfo
GetShortPathNameW
GetWindowsDirectoryW
GetSystemDirectoryW
EnterCriticalSection
CloseHandle
LeaveCriticalSection
InitializeCriticalSection
WaitForSingleObject
TerminateThread
CreateThread
GetProcAddress
GetVersionExW
Sleep
WideCharToMultiByte
HeapAlloc
HeapFree
LoadLibraryW
GetCurrentProcessId
GetCurrentThreadId
GetModuleFileNameW
PeekNamedPipe
TerminateProcess
GetEnvironmentVariableW
SetEnvironmentVariableW
GetCurrentProcess
DuplicateHandle
CreatePipe
CreateProcessW
GetExitCodeProcess
SetUnhandledExceptionFilter
HeapSize
MultiByteToWideChar
CreateDirectoryW
SetFileAttributesW
GetTempPathW
DeleteFileW
GetCurrentDirectoryW
SetCurrentDirectoryW
CreateFileW
SetFilePointer
TlsFree
TlsGetValue
TlsSetValue
TlsAlloc
HeapReAlloc
DeleteCriticalSection
InterlockedCompareExchange
InterlockedExchange
GetLastError
SetLastError
UnregisterWait
GetCurrentThread
RegisterWaitForSingleObject
user32
CharUpperW
CharLowerW
MessageBoxW
DefWindowProcW
DestroyWindow
GetWindowLongW
GetWindowTextLengthW
GetWindowTextW
UnregisterClassW
LoadIconW
LoadCursorW
RegisterClassExW
IsWindowEnabled
EnableWindow
GetSystemMetrics
CreateWindowExW
SetWindowLongW
SendMessageW
SetFocus
CreateAcceleratorTableW
SetForegroundWindow
BringWindowToTop
GetMessageW
TranslateAcceleratorW
TranslateMessage
DispatchMessageW
DestroyAcceleratorTable
PostMessageW
GetForegroundWindow
GetWindowThreadProcessId
IsWindowVisible
EnumWindows
SetWindowPos
gdi32
GetStockObject
comctl32
InitCommonControlsEx
shell32
ShellExecuteExW
SHGetFolderLocation
SHGetPathFromIDListW
winmm
timeBeginPeriod
ole32
CoInitialize
CoTaskMemFree
shlwapi
PathAddBackslashW
PathRenameExtensionW
PathQuoteSpacesW
PathRemoveArgsW
PathRemoveBackslashW
Sections
.code Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
WareHub_Cw4ck_By_discord.gg_Recte/IGNORE-THIS-FOLDER/DebugLog.txt
-
WareHub_Cw4ck_By_discord.gg_Recte/IGNORE-THIS-FOLDER/SharpMonoInjector.dll.dll windows:4 windows x86 arch:x86
Password: discord.gg/Recte
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
mscoree
_CorDllMain
Sections
.text Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
WareHub_Cw4ck_By_discord.gg_Recte/IGNORE-THIS-FOLDER/a
-
WareHub_Cw4ck_By_discord.gg_Recte/IGNORE-THIS-FOLDER/a.exe.exe windows:4 windows x86 arch:x86
Password: discord.gg/Recte
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
C:\Users\James\Documents\Visual Studio 2017\Projects\SharpMonoInjector\SharpMonoInjector.Console\obj\Release\smi.pdb
Imports
mscoree
_CorExeMain
Sections
.text Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
WareHub_Cw4ck_By_discord.gg_Recte/IGNORE-THIS-FOLDER/a.png.dll windows:4 windows x86 arch:x86
Password: discord.gg/Recte
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
mscoree
_CorDllMain
Sections
.text Size: 909KB - Virtual size: 909KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 884B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
WareHub_Cw4ck_By_discord.gg_Recte/IGNORE-THIS-FOLDER/a.txt
-
WareHub_Cw4ck_By_discord.gg_Recte/Instructions.txt