Overview
overview
3Static
static
3Config.zip
windows10-2004-x64
3Config/Settings.ini
windows10-2004-x64
1Plugins/An...ss.dll
windows10-2004-x64
1Plugins/Mods.dll
windows10-2004-x64
1Project Le...nt.dll
windows10-2004-x64
1Project Le...nt.exe
windows10-2004-x64
1Readme..txt
windows10-2004-x64
1Run This T...nt.exe
windows10-2004-x64
1fonts/font1
windows10-2004-x64
1run.bat
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
Config.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
Config/Settings.ini
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Plugins/Anticheat Bypass.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
Plugins/Mods.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Project Lethal Client.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
Project Lethal Client.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Readme..txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
Run This To Open The Client.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
fonts/font1
Resource
win10v2004-20240802-en
Behavioral task
behavioral10
Sample
run.bat
Resource
win10v2004-20240802-en
General
-
Target
Config.zip
-
Size
377KB
-
MD5
3cc713931c0b7d9be9eeb1d825db1198
-
SHA1
083a74748437f6b67d87a779976c414b5e9f4fc5
-
SHA256
aa1b1e806eb1877a6e7e3c6dc82fc1d052c8074453a36a9c169333ee6af52ced
-
SHA512
303f1ba3c547a21aab8c02213c31ef9188e123dfecd9ee7ebb8d6efa9d88f7f45c8d3009be03083fc1ab343b4f6835984e2f0d8960a474f17a164abe302d6524
-
SSDEEP
6144:TzUZn5nAaU+VlWmQSx9Z4kO0x8ZIfovgK8XGmHuyp1:TzUVddU+VlbSkOxIrXGmHnH
Malware Config
Signatures
-
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/Project Lethal Client.exe unpack001/Run This To Open The Client.exe
Files
-
Config.zip.zip
-
Config/Settings.ini
-
Plugins/Anticheat Bypass.dll
-
Plugins/Mods.dll
-
Project Lethal Client.dll
-
Project Lethal Client.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mscoree
_CorExeMain
Sections
.text Size: 414KB - Virtual size: 414KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Readme..txt
-
Run This To Open The Client.exe.exe windows:6 windows x64 arch:x64
74a6ef9e7b49c71341e439022f643c8e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
FindFirstFileExW
FindClose
HeapReAlloc
GetFileAttributesExW
CreateProcessW
GetExitCodeProcess
WaitForSingleObject
GetFileSizeEx
GetConsoleOutputCP
FlushFileBuffers
ReadConsoleW
GetConsoleMode
SetFilePointerEx
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetProcessHeap
SetStdHandle
CreateFileW
HeapSize
WriteConsoleW
Process32Next
CreateToolhelp32Snapshot
Process32First
GetModuleFileNameA
GetCurrentProcess
WideCharToMultiByte
GlobalFree
GlobalAlloc
MultiByteToWideChar
QueryPerformanceCounter
FreeLibrary
GetProcAddress
GetFileType
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
HeapFree
HeapAlloc
CloseHandle
GetLastError
GetCommandLineW
GetCommandLineA
WriteFile
GetStdHandle
TerminateProcess
Sleep
OpenProcess
FindNextFileW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
LocalFree
LCMapStringEx
GetStringTypeW
GetCPInfo
InitializeCriticalSectionAndSpinCount
CreateEventW
GetModuleHandleW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwindEx
RtlPcToFileHeader
RaiseException
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
ReadFile
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
RtlUnwind
advapi32
ConvertSidToStringSidW
ControlService
OpenServiceA
ChangeServiceConfigA
OpenSCManagerA
CloseServiceHandle
AdjustTokenPrivileges
LookupPrivilegeValueA
CreateProcessWithTokenW
ImpersonateLoggedOnUser
OpenProcessToken
SetThreadToken
StartServiceW
DuplicateTokenEx
QueryServiceStatusEx
GetTokenInformation
RegCreateKeyExW
RegSetValueExW
ole32
CoInitializeSecurity
CoSetProxyBlanket
CoCreateInstance
CoUninitialize
CoInitializeEx
oleaut32
SysFreeString
SysAllocString
VariantClear
Sections
.text Size: 179KB - Virtual size: 178KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 97KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
fonts/font1
-
run.bat