General

  • Target

    valorant checker.exe

  • Size

    7.5MB

  • Sample

    241024-2znbzsxama

  • MD5

    b266d718dd621131f58ccaf1b4f8530b

  • SHA1

    35adfad78f88d8992a2fc008a2fef660e7268ab7

  • SHA256

    5e4a051ba31bf97dbdc47336020d1a20540c9d2b6e9c6c41f81f77d778c15e44

  • SHA512

    d5380f2774dfdf474c5e4ceeb11a2e6b1cbec8b10d41f9407b631d3287be8affd3f031bc10f5de8646667345be9da8b35a4db95d894223878b32ea2d4fca3769

  • SSDEEP

    196608:KXgFHwfI9jUC2gYBYv3vbW5+iITm1U6fV:HFMIH2gYBgDW4TOz9

Malware Config

Targets

    • Target

      valorant checker.exe

    • Size

      7.5MB

    • MD5

      b266d718dd621131f58ccaf1b4f8530b

    • SHA1

      35adfad78f88d8992a2fc008a2fef660e7268ab7

    • SHA256

      5e4a051ba31bf97dbdc47336020d1a20540c9d2b6e9c6c41f81f77d778c15e44

    • SHA512

      d5380f2774dfdf474c5e4ceeb11a2e6b1cbec8b10d41f9407b631d3287be8affd3f031bc10f5de8646667345be9da8b35a4db95d894223878b32ea2d4fca3769

    • SSDEEP

      196608:KXgFHwfI9jUC2gYBYv3vbW5+iITm1U6fV:HFMIH2gYBgDW4TOz9

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks