General

  • Target

    WECANGOLEAK4LEAK.zip

  • Size

    4.5MB

  • MD5

    56c22f76b5d31d4d9853ac6158189917

  • SHA1

    a6bc0d362e6a04f50172c67ccc9cdbc8a664fee4

  • SHA256

    407dd93ca8b2513862cd466da378ec043ded508d57b4352baaa35601d620d486

  • SHA512

    077be434595122c6dff140bb95c6c1fd5578e07b5da7c691e96cb3c5368886d9112ecaa99ccf115adc16b58203c363d8fe87629cc8954960dce19815ea5fa978

  • SSDEEP

    98304:TbtXIbtXXjEDRqn1jFj5hyRBO57x4GVRn/om96j:Tbt4btjEDR21l5h8Ylohj

Score
7/10

Malware Config

Signatures

  • Themida packer 1 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Unsigned PE 4 IoCs

    Checks for missing Authenticode signature.

Files

  • WECANGOLEAK4LEAK.zip
    .zip
  • bin/Vanguard.dll
    .dll windows:6 windows x64 arch:x64


    Headers

    Exports

    Sections

  • bin/catalyst_luau.dll
    .dll windows:6 windows x64 arch:x64

    dfd11645eb4732c0409f51f0532c3683


    Headers

    Imports

    Exports

    Sections

  • bin/hax.dll
    .dll windows:6 windows x64 arch:x64

    a5f4a6147d2ed8a25d3af1361ec14b14


    Headers

    Imports

    Exports

    Sections

  • bin/luau.dll
    .dll windows:6 windows x64 arch:x64

    dfd11645eb4732c0409f51f0532c3683


    Headers

    Imports

    Exports

    Sections

  • bridge/main.py
  • build-init.py
    .py .js
  • exploit_api/main.py
  • exploit_api/memopy/api.py
  • exploit_api/rizz/base.py
  • exploit_api/rizz/boundfuncdescriptor.py
  • exploit_api/rizz/bridge.py
  • exploit_api/rizz/bridge_callbacks.py
  • exploit_api/rizz/bytecode.py
  • exploit_api/rizz/classdescriptor.py
  • exploit_api/rizz/instance.py
  • exploit_api/rizz/propertydescriptor.py
  • exploit_api/rizz/utils.py
  • init.lua
    .js
  • main.py
  • misc/app_info.py