General

  • Target

    Zenc.zip

  • Size

    662KB

  • MD5

    d3233f3f97d7678e9be97686cd00c6a4

  • SHA1

    118f3b2912fc2f2fb4fcb11a026875a4cc5f1b98

  • SHA256

    65f2f688d7b45891204500a0d8970cdf7c580be25f1bec44f7ae748a33f27924

  • SHA512

    a5d52f1ac3d240ef069e1afd702965e340d9dea925d0f7ee3cae3f4d3979712eff4afdf932284b834d1b876d3acfaecce7762a6d76cc531912dd988ae2063a29

  • SSDEEP

    12288:aXSQd7O0sA8yi7nCwfBQpgB5gPlzTxbTw9m8VztbfsMYZVsHHE8WlFWvmIxCZR:O00Pi7CwIgjgrPGpVBfsVPIHqwPg

Score
3/10

Malware Config

Signatures

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • Zenc.zip
    .zip
  • autoexec/e.txt
  • bin/LuaState.dll
    .dll windows:6 windows x64 arch:x64

    a5f4a6147d2ed8a25d3af1361ec14b14


    Headers

    Imports

    Exports

    Sections

  • bin/luau.dll
    .dll windows:6 windows x64 arch:x64

    dfd11645eb4732c0409f51f0532c3683


    Headers

    Imports

    Exports

    Sections

  • env.luau
    .js
  • exploit_api/__pycache__/main.cpython-312.pyc
  • exploit_api/__pycache__/newb.cpython-312.pyc
  • exploit_api/main.py
  • exploit_api/newb.py
  • exploit_api/titties/__pycache__/api.cpython-312.pyc
  • exploit_api/titties/__pycache__/base.cpython-312.pyc
  • exploit_api/titties/__pycache__/boundfuncdescriptor.cpython-312.pyc
  • exploit_api/titties/__pycache__/bridge.cpython-312.pyc
  • exploit_api/titties/__pycache__/bytecode.cpython-312.pyc
  • exploit_api/titties/__pycache__/classdescriptor.cpython-312.pyc
  • exploit_api/titties/__pycache__/instance.cpython-312.pyc
  • exploit_api/titties/__pycache__/propertydescriptor.cpython-312.pyc
  • exploit_api/titties/__pycache__/utils.cpython-312.pyc
  • exploit_api/titties/api.py
  • exploit_api/titties/auto_dumper/__pycache__/offset_dumper.cpython-312.pyc
  • exploit_api/titties/auto_dumper/offset_dumper.py
  • exploit_api/titties/base.py
  • exploit_api/titties/boundfuncdescriptor.py
  • exploit_api/titties/bridge.py
  • exploit_api/titties/bridge_callbacks.py
  • exploit_api/titties/bytecode.py
  • exploit_api/titties/classdescriptor.py
  • exploit_api/titties/instance.py
  • exploit_api/titties/propertydescriptor.py
  • exploit_api/titties/utils.py
  • launch.bat
  • main.py
  • misc/s1.py
  • workspace/IY_FE.iy
  • workspace/file.lua
  • workspace/hi.txt