General
-
Target
corruptedmodz cheat.exe
-
Size
45KB
-
Sample
240510-tmha7seb5t
-
MD5
d46727b08dc65590b4bf19822d69de8a
-
SHA1
baf05760cc92a7fb4d09c5feff975a0581c23b6f
-
SHA256
1ad07ccab43270cd5edc95e993836fa170e29f1b3406c9b69b3667cad7a1e753
-
SHA512
068573c0d670753b14bf3cfd81a5c6e291991a5e9834db20f55d9d2b67b70c8a3db532b7e08b551605f0d76144a1b5ea0d6be94e66652449ff383315a8c6c131
-
SSDEEP
768:xdhO/poiiUcjlJIn0QH9Xqk5nWEZ5SbTDa/WI7CPW5v:vw+jjgnNH9XqcnW85SbTGWI3
Behavioral task
behavioral1
Sample
corruptedmodz cheat.exe
Resource
win7-20240508-en
Malware Config
Extracted
xenorat
thought-rolls.gl.at.ply.gg
23y7-bdgd-2cb
-
delay
3000
-
install_path
appdata
-
port
45999
-
startup_name
runtimebroker
Targets
-
-
Target
corruptedmodz cheat.exe
-
Size
45KB
-
MD5
d46727b08dc65590b4bf19822d69de8a
-
SHA1
baf05760cc92a7fb4d09c5feff975a0581c23b6f
-
SHA256
1ad07ccab43270cd5edc95e993836fa170e29f1b3406c9b69b3667cad7a1e753
-
SHA512
068573c0d670753b14bf3cfd81a5c6e291991a5e9834db20f55d9d2b67b70c8a3db532b7e08b551605f0d76144a1b5ea0d6be94e66652449ff383315a8c6c131
-
SSDEEP
768:xdhO/poiiUcjlJIn0QH9Xqk5nWEZ5SbTDa/WI7CPW5v:vw+jjgnNH9XqcnW85SbTGWI3
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-