General
-
Target
WarzoneCheat.py
-
Size
5.2MB
-
Sample
240523-szhbasfg9x
-
MD5
d491439827e0fe5fe470e0d681ac5002
-
SHA1
f88367bf4b313113cc9d39c3d836db6f4e96a445
-
SHA256
f34cf613acec75671acf4090921675e6d1ff2e3145e6325e858e3cff7ec79548
-
SHA512
2949c702124c917eed2d244f6b8216db916aed2040018d38aa5a0ad7464ecbd986c50f11b2cf92a3db9e7153e676c84d63918ea31e1521f87d8e1db077b28dd0
-
SSDEEP
768:/fTob11xwKHde+57I+dc9EIEHn0hnyAv0HPtcghCYfNW6kARzZ2GqM09HQlMfH5P:ijPM
Static task
static1
Behavioral task
behavioral1
Sample
WarzoneCheat.py
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
WarzoneCheat.py
-
Size
5.2MB
-
MD5
d491439827e0fe5fe470e0d681ac5002
-
SHA1
f88367bf4b313113cc9d39c3d836db6f4e96a445
-
SHA256
f34cf613acec75671acf4090921675e6d1ff2e3145e6325e858e3cff7ec79548
-
SHA512
2949c702124c917eed2d244f6b8216db916aed2040018d38aa5a0ad7464ecbd986c50f11b2cf92a3db9e7153e676c84d63918ea31e1521f87d8e1db077b28dd0
-
SSDEEP
768:/fTob11xwKHde+57I+dc9EIEHn0hnyAv0HPtcghCYfNW6kARzZ2GqM09HQlMfH5P:ijPM
Score8/10-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Registers COM server for autorun
-
Adds Run key to start application
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-