General

  • Target

    exec.zip

  • Size

    14.3MB

  • MD5

    6ebee2012987575666551ff7b0e199d0

  • SHA1

    2fc0003aa8fef6b9e8c41e59e28f232fca43a6d0

  • SHA256

    d9fbcc76926af35fda3a33402e3c85dd11ca53757867fea53b981eed1c813394

  • SHA512

    d77276e0326b40296b162c05fc61e698d0b8542ff69c7511959d7a58636ebed1609a4bc0035178dcd03f35415d944b3dbf36b9e14fb6fabd29fb895255eae521

  • SSDEEP

    393216:DKSisCUyyfsBsNqsKsAm/K+peGZuJ781FSAD:GSisCUKcqsnAaKbGZa7sMw

Score
3/10

Malware Config

Signatures

  • Unsigned PE 3 IoCs

    Checks for missing Authenticode signature.

Files

  • exec.zip
    .zip

    Password: sdd

  • exec/autoexec/e.txt
  • exec/bin/LuaState.dll
    .dll windows:6 windows x64 arch:x64

    Password: sdd

    a5f4a6147d2ed8a25d3af1361ec14b14


    Headers

    Imports

    Exports

    Sections

  • exec/bin/luau.dll
    .dll windows:6 windows x64 arch:x64

    Password: sdd

    dfd11645eb4732c0409f51f0532c3683


    Headers

    Imports

    Exports

    Sections

  • exec/env.luau
    .js
  • exec/executor.exe
    .exe windows:6 windows x64 arch:x64

    Password: sdd

    50acbffe7a37d02e3ff3a14c52ba0df4


    Headers

    Imports

    Sections

  • exec/exploit_api/main.py
  • exec/exploit_api/newb.py
  • exec/exploit_api/titties/api.py
  • exec/exploit_api/titties/auto_dumper/__pycache__/offset_dumper.cpython-312.pyc
  • exec/exploit_api/titties/auto_dumper/offset_dumper.py
  • exec/exploit_api/titties/base.py
  • exec/exploit_api/titties/boundfuncdescriptor.py
  • exec/exploit_api/titties/bridge.py
  • exec/exploit_api/titties/bridge_callbacks.py
  • exec/exploit_api/titties/bytecode.py
  • exec/exploit_api/titties/classdescriptor.py
  • exec/exploit_api/titties/instance.py
  • exec/exploit_api/titties/propertydescriptor.py
  • exec/exploit_api/titties/utils.py