General
-
Target
release9-24-24.rar
-
Size
8.3MB
-
Sample
240925-2ahp7sthjg
-
MD5
59d01c3b832de94184c99361e28280fc
-
SHA1
874fb106bd28b8a0a28773dd9a34267ccbf8ae57
-
SHA256
879445d6f49fba75427fa0a51a710c8621fbe1ff2a68d8e3afedaeb42bd6bf50
-
SHA512
8c7509848481bf1a3b2767ee7b551178364328c5b2bf61adb7ec292bfcd1ad256d42496aef8b8f55d097692e47c4796671a422e07c1b905ab844b56df27b1246
-
SSDEEP
196608:/bLMUuQVTmWkkZZl7PNHxAvGUFi0gpuKLoqizxw1wZ:T4bQhmWkkZNRA+UA0gxLonzv
Behavioral task
behavioral1
Sample
release/main/cheat.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
release/main/cheat.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
release/main/loader.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
release/main/loader.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
release/map/Map.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
release/map/Map.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
release/main/cheat.exe
-
Size
4.1MB
-
MD5
adce8ae3c5b9e7207349ea33d131e6aa
-
SHA1
b73397bf523c8c6cb645088068c0ed795f1e94c8
-
SHA256
1a5cee10548f84dc07a94a835d66ba42c858df1f1940835b4f3371754f6579fa
-
SHA512
790e79a01378b494cf3eea53ff20ba2798d539780ce0b8d0a8bbb26c24bf407760443b79196db70e207772a49fcd301b98013d977f21f8b35efcba2f57576676
-
SSDEEP
98304:VtcWTbvJ81qlsFS3KftOBsVIhA/YPE1ud2cJaxHBX:TzTbvJRsFS3qOBsYAQ8a2cJWBX
Score9/10-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Sets service image path in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
release/main/loader.exe
-
Size
4.1MB
-
MD5
9ecdc9ed1bea6c226f92d740d43400b9
-
SHA1
b5b5066cd4284733d8c3f3d7de3ca6653091ae10
-
SHA256
60c57f14c2e0e0df0bda16646b21dddceaee0159dafbbb8daba310d4e1b5be6c
-
SHA512
30bc705a2438288e3647d5adfc6119d751823970972b9c6b39a60384a2b7ac261986026b8d1c0b0ca7ee3d7e95363c97b873fdc5fad4096c903cb4e15bf57e43
-
SSDEEP
98304:vnUGAC+hqc8lqvdzw2nsNKYYURyc9JirsN4JzmUPj:PTn2qcUzp6UYeJRCxPj
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
release/map/Map.exe
-
Size
416KB
-
MD5
36c50332466b6e921edb79ea4b240278
-
SHA1
5b858fb375235e7638b7cef22ca972d27ce9cacc
-
SHA256
0a76f7d189b368598ee017d0094a6698ffff66d0f981f85769971170ca29e042
-
SHA512
fbc23c9d21e9dd3fbb7eac87fcee7e9db52d6c6450402ec90a7ba43940029af00d4ab9db8f0e662f30d8f99a34326673f26051932e2ae7afcfb377d053f4cc41
-
SSDEEP
12288:rbNG38Jf2mCsCTyTH8+vtQ7BWD24cVLxSf0:rbNG38Jf2mCsCTMc+laBH4cVLxSf
Score8/10-
Modify Registry: Disable Windows Driver Blocklist
Disable Windows Driver Blocklist via Registry.
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Impair Defenses
1Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
1