Static task
static1
Behavioral task
behavioral1
Sample
TriggerBot Valorant cheater.fun/trigger/Free Hacks for Games.url
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
TriggerBot Valorant cheater.fun/trigger/Free Hacks for Games.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
TriggerBot Valorant cheater.fun/trigger/Siticone.UI.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
TriggerBot Valorant cheater.fun/trigger/Siticone.UI.dll
Resource
win10v2004-20240910-en
Behavioral task
behavioral5
Sample
TriggerBot Valorant cheater.fun/trigger/trigger.exe
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
TriggerBot Valorant cheater.fun/trigger/trigger.exe
Resource
win10v2004-20240802-en
General
-
Target
02-10-2024_IFt3mHHlxScokqX.zip
-
Size
3.1MB
-
MD5
e59438c4f6d891a671b1a2d319048517
-
SHA1
caefdd9fc7fddac15b5d6fdbb68436c35ab8362f
-
SHA256
6407bd134c1b9aa297620318392f85fa671166a280a67a3c13725b6d1ce953ce
-
SHA512
ab6612e056f470b947a3afb9c183ff5f1a018a72bc92991f08fa94845cdae8c70f6e17e5ab6104c26e05051abe4730e3623d352165b722b8496e8457d0ed2367
-
SSDEEP
98304:yyebyaIoz+VzC8yCuSElRJqGCxY3g9uGX/LSz1:yyebyaMVeRCuSELhYAeuS/LS5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/TriggerBot Valorant cheater.fun/trigger/trigger.exe
Files
-
02-10-2024_IFt3mHHlxScokqX.zip.zip
Password: 123
-
TriggerBot Valorant cheater.fun/trigger/Free Hacks for Games.url
-
TriggerBot Valorant cheater.fun/trigger/Siticone.UI.dll.dll windows:4 windows x86 arch:x86
Password: 123
dae02f32a21e03ce65412f6e56942daa
Code Sign
3a:93:0b:19:8f:29:72:9a:49:b0:8b:f3:6d:f8:17:aeCertificate
IssuerCN=Siticone Root CANot Before05-02-2020 06:42Not After22-10-2030 17:00SubjectCN=Siticone Technology03:01:9a:02:3a:ff:58:b1:6b:d6:d5:ea:e6:17:f0:66Certificate
IssuerCN=DigiCert Assured ID CA-1,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before22-10-2014 00:00Not After22-10-2024 00:00SubjectCN=DigiCert Timestamp Responder,O=DigiCert,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
06:fd:f9:03:96:03:ad:ea:00:0a:eb:3f:27:bb:ba:1bCertificate
IssuerCN=DigiCert Assured ID Root CA,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before10-11-2006 00:00Not After10-11-2021 00:00SubjectCN=DigiCert Assured ID CA-1,OU=www.digicert.com,O=DigiCert Inc,C=USExtended Key Usages
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageEmailProtection
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
34:8f:92:bf:68:07:1b:a4:18:d3:f6:b4:4e:02:5a:2c:51:c0:51:c0Signer
Actual PE Digest34:8f:92:bf:68:07:1b:a4:18:d3:f6:b4:4e:02:5a:2c:51:c0:51:c0Digest Algorithmsha1PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
C:\Users\Ilham-PC\Documents\Visual Studio 2015\Projects\Siticone.UI\Build\Release\Siticone.UI.WinForms\Siticone.UI.pdb
Imports
mscoree
_CorDllMain
Sections
.text Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
TriggerBot Valorant cheater.fun/trigger/trigger.exe.exe windows:4 windows x86 arch:x86
Password: 123
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
trigger.pdb
Imports
mscoree
_CorExeMain
Sections
.text Size: 3.5MB - Virtual size: 3.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 424KB - Virtual size: 424KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ