Static task
static1
General
-
Target
CS2Cheat (123).zip
-
Size
5.7MB
-
MD5
148098afaadc07fd0b8b0d14d9b5d9d4
-
SHA1
7eaca8c4c1e35da1357c547145346037eb037062
-
SHA256
a9b604c34a849e743d65ee178e52090824b6220b806db53c50df8901e1fc7658
-
SHA512
4c491680a6a39324187e8d5f6542ecd36ec00ac0727361f10e6008f90fd2ed9b8af5d11cd289f1004b7cc216e74b01374feb49c61e184378084a6ed6fe4678b5
-
SSDEEP
98304:4ljVhV4b0V4wMGWscapVlwIinJE2rUPrwZDY9B2BCVZWG25kvNdBTvL10mVqDPw:YhVTFppV8JdUcZM9B2B9EVdBbL1HqDo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/CS2Cheat.exe
Files
-
CS2Cheat (123).zip.zip
Password: 123
-
CS2Cheat.exe.exe windows:4 windows x86 arch:x86
Password: 123
94400fe3e62cd2376124312fe435b8e4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
UpdateWindow
TranslateMessage
ShowWindow
SendMessageA
RegisterClassExA
PostQuitMessage
MessageBoxA
LoadIconA
LoadCursorA
GetMessageA
DispatchMessageA
DefWindowProcA
CreateWindowExA
kernel32
GetModuleHandleA
HeapAlloc
lstrlenA
lstrcpynA
lstrcpyA
lstrcatA
WriteFile
SizeofResource
SetFileAttributesA
RtlMoveMemory
LockResource
LoadResource
LoadLibraryA
CloseHandle
CreateFileA
ExitProcess
FindResourceA
FreeResource
GetCommandLineA
GetEnvironmentVariableA
GetFileSize
GetModuleFileNameA
GlobalFree
GetProcAddress
GetProcessHeap
GetSystemDirectoryA
GetTempPathA
GetWindowsDirectoryA
GlobalAlloc
HeapFree
shlwapi
PathFindFileNameA
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5.7MB - Virtual size: 5.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE