Overview
overview
7Static
static
3Valorant-T...ue.exe
windows10-2004-x64
1Valorant-T...ue.exe
windows11-21h2-x64
1Valorant-T...que.py
windows10-2004-x64
3Valorant-T...que.py
windows11-21h2-x64
3Valorant-T...ce.exe
windows10-2004-x64
1Valorant-T...ce.exe
windows11-21h2-x64
1Valorant-T...cho.py
windows10-2004-x64
3Valorant-T...cho.py
windows11-21h2-x64
3Valorant-T...eh.exe
windows10-2004-x64
3Valorant-T...eh.exe
windows11-21h2-x64
3Valorant-T...re.exe
windows10-2004-x64
7Valorant-T...re.exe
windows11-21h2-x64
7Valorant-T...ire.py
windows10-2004-x64
3Valorant-T...ire.py
windows11-21h2-x64
3Resubmissions
24-08-2024 03:44
240824-eap3ystbql 7Analysis
-
max time kernel
135s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2024 03:44
Behavioral task
behavioral1
Sample
Valorant-Triggerbot-main/Unique.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
Valorant-Triggerbot-main/Unique.exe
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
Valorant-Triggerbot-main/Unique.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
Valorant-Triggerbot-main/Unique.py
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
Valorant-Triggerbot-main/YouCanPayAnothaWayRefrence.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
Valorant-Triggerbot-main/YouCanPayAnothaWayRefrence.exe
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
Valorant-Triggerbot-main/echo.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
Valorant-Triggerbot-main/echo.py
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
Valorant-Triggerbot-main/meh.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral10
Sample
Valorant-Triggerbot-main/meh.exe
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
Valorant-Triggerbot-main/prefire.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral12
Sample
Valorant-Triggerbot-main/prefire.exe
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
Valorant-Triggerbot-main/prefire.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral14
Sample
Valorant-Triggerbot-main/prefire.py
Resource
win11-20240802-en
General
-
Target
Valorant-Triggerbot-main/meh.exe
-
Size
168KB
-
MD5
06623b79ead1b71c096e387985d2ebb1
-
SHA1
d609ded4e12be1257fd16cb222408f8613160385
-
SHA256
3b88b143b1ab0be5aca4f714e187245791a87d6b8c0fe10715079bb8cbbb3d95
-
SHA512
598ecad496019046b47b01e2620c99bda071ce36f30899031456532e806948367dbdb61442baee11815e57a4c2d809d21773b891049a7d98499dd19523e6b3b0
-
SSDEEP
3072:VeBnrLqj5I26idJMZpabNCfibe0SyKPwEfoq6RVgIHvu:YnSS1iPMZpjijKZaHvu
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language meh.exe