Analysis

  • max time kernel
    63s
  • max time network
    63s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2024 07:48

General

  • Target

    TriggerBot Valorant cheater.fun/trigger/trigger.exe

  • Size

    3.9MB

  • MD5

    0d9659d907e2669a6b925fe1fdd2fe68

  • SHA1

    ca2b9d8450c827625e4b0f8379685b3d247f2717

  • SHA256

    025153faab21056472b13f00fb79a6bfb917e3fcd85eb4c08b7375e6e3e0cb87

  • SHA512

    b1af46307dfc466d8743aeb19ce4cd303e1f15b5bfd13c68f479c18046a8cb48f222a4f51cef09459736dab4ec665c564c4a6e42054933145e8c2ffec3f5158f

  • SSDEEP

    98304:Az92834b9W0v0DdmDDzh4MnBpS8vtjMkc:UdeJbgkjMkc

Score
1/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\TriggerBot Valorant cheater.fun\trigger\trigger.exe
    "C:\Users\Admin\AppData\Local\Temp\TriggerBot Valorant cheater.fun\trigger\trigger.exe"
    1⤵
      PID:4916

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\OjzrYzJmjMSaO\trigger.exe_Url_lq11yjliqordqyvlun4yonva1bgtvrsj\80.57.11.26\2s1ighw1.newcfg

      Filesize

      2KB

      MD5

      178b05ad3240b305354ed7be1f1a7436

      SHA1

      d26f18115d4c348f979356397d255fb6de290985

      SHA256

      6d46f0fb43b43d844491da5b2c04e7223fd9909ab7086644354fefd3d6d40a70

      SHA512

      c448271ce63a0f2e555dc14e65a78f383ec8ab6b8a89a201d2438ee5a59dfd5e36efa944d37906a665e077a962ecc5e153683a317589fea7333a4180915379b8

    • C:\Users\Admin\AppData\Local\OjzrYzJmjMSaO\trigger.exe_Url_lq11yjliqordqyvlun4yonva1bgtvrsj\80.57.11.26\5vrhwl4t.newcfg

      Filesize

      2KB

      MD5

      d28bc062cbf7d3b1bc9994414d683b22

      SHA1

      7aad687f64675416725d9eaeefbd11e9b6326d50

      SHA256

      daf8702c7d6749b28a9079573a854bf9e6ec091352ca208bc019fde11d935629

      SHA512

      8d8c5ef8f78219622c3ec4e49efed3e82ead6f7820a3428647d813671e9d60a96a2e2c56c65b25535964b45a8b663a4dad7d63d63bfd3e79f27648c84f4248c1

    • C:\Users\Admin\AppData\Local\OjzrYzJmjMSaO\trigger.exe_Url_lq11yjliqordqyvlun4yonva1bgtvrsj\80.57.11.26\d3tihh2k.newcfg

      Filesize

      1KB

      MD5

      0eb7a5a5bc4b82c1f04c0a2cb273c8fc

      SHA1

      0acae31ad8e9ad8188218036f1712a135db77e2a

      SHA256

      515fc0eabbcfecafdfad51b4c98c3661e260067fc79922d8d4bc8508c9c8ad59

      SHA512

      f4d077774d55db09127daabdedd9c1f3f75380916f200d5bd295eac64f7ae8a6abac481d82566c26fd9e2dc43fc8576dd33c72aec6d58a33830bdd7e229b1c73

    • C:\Users\Admin\AppData\Local\OjzrYzJmjMSaO\trigger.exe_Url_lq11yjliqordqyvlun4yonva1bgtvrsj\80.57.11.26\dzi4qc1w.newcfg

      Filesize

      1KB

      MD5

      a75a1da3937e5727f0ea5e767b70249a

      SHA1

      85407e28e0088aab2f154194c5b9cdca4040a1cf

      SHA256

      3ceed5a42d021ba5c18780c57d5ce26b7467b22d9ea1fcdf254000eba0755fd1

      SHA512

      bb3acdfe5f8412fae3a0013d2c4b4e08d5ec365a2fe8d3953901e8cae7917383e94bc67773438db5cf18051f027542ecfd016dd969eb9571b4a970bfe9d7a95d

    • C:\Users\Admin\AppData\Local\OjzrYzJmjMSaO\trigger.exe_Url_lq11yjliqordqyvlun4yonva1bgtvrsj\80.57.11.26\k1b1ku2e.newcfg

      Filesize

      2KB

      MD5

      522785efc534ee1a41dcde8ebc57978b

      SHA1

      c98c24ad649b65543028b677b26bab5e48a07b9c

      SHA256

      50554e95c89ecf25fc9d79b21f982dd42d6f88bb113a747f465e347ce34298a6

      SHA512

      d8a63d299f93a8f1fe20aedd234e0f51574967fbb2a50424fa848eae1f9bdb8a279bcc642d342ca4eeab9f852aa968e28fa0f56e42f59a5f4fbdee1c378c8891

    • C:\Users\Admin\AppData\Local\OjzrYzJmjMSaO\trigger.exe_Url_lq11yjliqordqyvlun4yonva1bgtvrsj\80.57.11.26\my2g1laq.newcfg

      Filesize

      1KB

      MD5

      888209259b85cc86d0bd942be5c84ad6

      SHA1

      ccec2942c5d5b79f9bd3e87ee0224a30c4d1316f

      SHA256

      09dcabb216ce6925d0536acab4b57dcda0e4ecc036aa1c10aac8c07445460380

      SHA512

      ee34b589782ba812e19c1bbcb8fa9bca32a1d377c31c62dc836d4026bb3c5f7b72e04023e359d3b7ba43eb0e43958e3b796e607ef1f739583b4c4135855d477d

    • C:\Users\Admin\AppData\Local\OjzrYzJmjMSaO\trigger.exe_Url_lq11yjliqordqyvlun4yonva1bgtvrsj\80.57.11.26\user.config

      Filesize

      930B

      MD5

      b78057f41501788e05712ab5f7aedc66

      SHA1

      905da0c70a2b370a2361202e23298112c95ae377

      SHA256

      e11cd6f4767649bb1268a06202e09e4f49d0d2aa65cb82b10c2726c529a4d2fe

      SHA512

      60dfe1e76f17d3f486b3b8ef7949bce4d8202ac875d4bed8a3ea485649e09ae953260bf55e939c71ed4cc552235af2e3b90406b4a76827a35f7315a7b3007575

    • C:\Users\Admin\AppData\Local\OjzrYzJmjMSaO\trigger.exe_Url_lq11yjliqordqyvlun4yonva1bgtvrsj\80.57.11.26\user.config

      Filesize

      1KB

      MD5

      8ffd8c49e8dc7a4bec64e3fc8fae6ff9

      SHA1

      76f8c169c1d5460e8b472a98b667da4ec4cb1829

      SHA256

      c1f3e18d3e1a7dae06030492c684e5af180c281673cd8a333ede14b04881a370

      SHA512

      1360ae09b623acc1021bc6a3d7227f97417fd15d735cc878e135c02e2787aaac9f6aa8efef5a2940ef01d30d565212767f36b4fa4cdd7a81512816e3305e93ab

    • C:\Users\Admin\AppData\Local\OjzrYzJmjMSaO\trigger.exe_Url_lq11yjliqordqyvlun4yonva1bgtvrsj\80.57.11.26\user.config

      Filesize

      2KB

      MD5

      cc6abfed20db45291d7940c93cf80780

      SHA1

      1d7c27fb601ecf75763757a125baeb70928bf056

      SHA256

      c2b7e7760814bbd7ab1ec3c178a9e5d6a06bcb79a8cfe0657db69a82476cbcac

      SHA512

      faf8a8879165e90729f4335d73be0138326309b4008f94e66f76cb3dd195c23c76e53a7d3b1ded5328d747b5af0ddd04140f252c11811fda951d397077f16941

    • C:\Users\Admin\AppData\Local\OjzrYzJmjMSaO\trigger.exe_Url_lq11yjliqordqyvlun4yonva1bgtvrsj\80.57.11.26\wuuje1ll.newcfg

      Filesize

      2KB

      MD5

      0e9bdde2f5d56b3de02f779870c8d3eb

      SHA1

      cd249505eb66524b49bb072308d03d21cf2c0ada

      SHA256

      4b2d54422c8ee7afedfd761b861da175157be10b1c9aa006b994c236cda7236d

      SHA512

      5871b8d329f50e2b3f72466971943125d5a764587c163b3c44b5e7b06b534ec164b0ba0f463a47fa6e2a56aa886c21a1e08c19f517f3137c38239a0b4ce2f4db

    • C:\Users\Admin\AppData\Local\Temp\TriggerBot Valorant cheater.fun\trigger\Colors.ini

      Filesize

      47B

      MD5

      1bf1173ed75b05f13ff1f85d12f1bed8

      SHA1

      b89396b28ac173b65c227e54b888f424ff3c7a5f

      SHA256

      7a23f791a070ab5f14be698c79c566dbd7af486dd8d352fe38639d74de536d0a

      SHA512

      f844e2662534ff50dad31fbdc780dd343e4d8d5423533d566d066808d55a60d3e9ae84ae67605fe250c6d90ca2147aff994dcdf9f0f1803c4231b92f92c40f18

    • memory/4916-7-0x00007FFCC7733000-0x00007FFCC7735000-memory.dmp

      Filesize

      8KB

    • memory/4916-0-0x00007FFCC7733000-0x00007FFCC7735000-memory.dmp

      Filesize

      8KB

    • memory/4916-18-0x000001BEDC370000-0x000001BEDC392000-memory.dmp

      Filesize

      136KB

    • memory/4916-19-0x000001BEDCC60000-0x000001BEDCD0A000-memory.dmp

      Filesize

      680KB

    • memory/4916-13-0x00007FFCC7730000-0x00007FFCC81F1000-memory.dmp

      Filesize

      10.8MB

    • memory/4916-10-0x00007FFCC7730000-0x00007FFCC81F1000-memory.dmp

      Filesize

      10.8MB

    • memory/4916-32-0x00007FFCC7730000-0x00007FFCC81F1000-memory.dmp

      Filesize

      10.8MB

    • memory/4916-9-0x00007FFCC7730000-0x00007FFCC81F1000-memory.dmp

      Filesize

      10.8MB

    • memory/4916-8-0x00007FFCC7730000-0x00007FFCC81F1000-memory.dmp

      Filesize

      10.8MB

    • memory/4916-17-0x000001BEDC5B0000-0x000001BEDC60C000-memory.dmp

      Filesize

      368KB

    • memory/4916-6-0x00007FFCC7730000-0x00007FFCC81F1000-memory.dmp

      Filesize

      10.8MB

    • memory/4916-5-0x00007FFCC7730000-0x00007FFCC81F1000-memory.dmp

      Filesize

      10.8MB

    • memory/4916-4-0x00007FFCC7730000-0x00007FFCC81F1000-memory.dmp

      Filesize

      10.8MB

    • memory/4916-126-0x00007FFCC7730000-0x00007FFCC81F1000-memory.dmp

      Filesize

      10.8MB

    • memory/4916-3-0x000001BEBDDD0000-0x000001BEBDDE4000-memory.dmp

      Filesize

      80KB

    • memory/4916-2-0x000001BEDA310000-0x000001BEDA45E000-memory.dmp

      Filesize

      1.3MB

    • memory/4916-1-0x000001BEBD5E0000-0x000001BEBD9D2000-memory.dmp

      Filesize

      3.9MB