E:\Documentos\codigos\MW3UniversalESP\Release\MW3UniversalESP.pdb
Static task
static1
Behavioral task
behavioral1
Sample
Injecteur + Aimbot By MrHaCrack/Extreme Injector by master131.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Injecteur + Aimbot By MrHaCrack/Extreme Injector by master131.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Injecteur + Aimbot By MrHaCrack/MW3SteamESP.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Injecteur + Aimbot By MrHaCrack/MW3SteamESP.dll
Resource
win10v2004-20240802-en
General
-
Target
173d8d1662942d374b5676ec6b192a04_JaffaCakes118
-
Size
72KB
-
MD5
173d8d1662942d374b5676ec6b192a04
-
SHA1
d9d5437503a118e8e5723a9fd31f465d90cbb17e
-
SHA256
a44dd4e1016189209828f01e81f256bb911e62934a6434225bd2b382a5788248
-
SHA512
8e71e93da1d63cb70a331d0c816ce39b2bbd969279d635353013087f98d2f8fe66a60dccb6bb13674647dfaea297c40db2c4cb41524989e33a2fe00eca084d82
-
SSDEEP
1536:CL4NXYBz6ljGOjTujU91tp6YUemuQWcC4AILf9gCKR8fj0:Hqz6lXsu1j6imDWi6C54
Malware Config
Signatures
-
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/Injecteur + Aimbot By MrHaCrack/Extreme Injector by master131.exe unpack001/Injecteur + Aimbot By MrHaCrack/MW3SteamESP.dll
Files
-
173d8d1662942d374b5676ec6b192a04_JaffaCakes118.rar
-
Injecteur + Aimbot By MrHaCrack/Extreme Injector by master131.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 115KB - Virtual size: 115KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Injecteur + Aimbot By MrHaCrack/MW3SteamESP.dll.dll windows:5 windows x86 arch:x86
b5b53a00fd61434fdae02802a791f1b4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetModuleHandleA
VirtualProtect
AddVectoredExceptionHandler
GetCurrentProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
InterlockedCompareExchange
Sleep
InterlockedExchange
DecodePointer
EncodePointer
IsProcessorFeaturePresent
user32
GetAsyncKeyState
MessageBoxA
GetClientRect
ScreenToClient
GetCursorPos
FindWindowW
psapi
GetModuleInformation
msvcr100
exit
_vsnprintf_s
_vsnprintf
_malloc_crt
free
_encoded_null
_initterm
_initterm_e
sprintf
__CppXcptFilter
_crt_debugger_hook
__clean_type_info_names_internal
_unlock
__dllonexit
_lock
_onexit
_except_handler4_common
malloc
strrchr
strcpy_s
strstr
_CIatan
_CIsqrt
memset
__CxxFrameHandler3
_CIatan2
_amsg_exit
Sections
.text Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ