General
-
Target
johny56x__Valorant_cheat.exe
-
Size
29KB
-
MD5
0055876b888ce2dcacc4c50802e2bc89
-
SHA1
6bb1a04cd05e8a4c45b36d1d828198ce1c7ce540
-
SHA256
ae1e5e13a6ff958151924ea3d0f4f5df618871065e530c5fde854161b91591c2
-
SHA512
a3a74e076449b44a5cb22d76423ed92489f9db497478c8f16d6e84d169f2645e23b90f34ca09db065c591e5fa43fa6af088f860e6e6b5f4b3ac19da3e5917123
-
SSDEEP
384:piY/4mcwYPSNOjKjg11+rVlOxxtNP97kJkgQ8pwIIumVbgORBprjlJZpTJ3uPbHz:piWWjjKjrOFgwItmVsOlr1B+9L
Malware Config
Signatures
-
Detect Poverty Stealer Payload 1 IoCs
resource yara_rule sample family_povertystealer -
Povertystealer family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource johny56x__Valorant_cheat.exe
Files
-
johny56x__Valorant_cheat.exe.exe windows:5 windows x86 arch:x86
f63e2b20da57bba52ad3b39011a8e8d2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForMultipleObjects
GetUserDefaultUILanguage
InitializeCriticalSectionAndSpinCount
CreateMutexA
Sleep
GetLastError
CloseHandle
GetSystemInfo
CreateThread
DeleteCriticalSection
ExitProcess
GlobalMemoryStatusEx
HeapFree
GetModuleFileNameW
HeapReAlloc
IsDBCSLeadByte
HeapAlloc
GetProcessHeap
WideCharToMultiByte
GetCurrentProcess
VirtualAlloc
GetFileAttributesW
DuplicateHandle
GetModuleHandleA
OpenProcess
LoadLibraryA
GetProcAddress
IsWow64Process
LeaveCriticalSection
MultiByteToWideChar
EnterCriticalSection
user32
ReleaseDC
EnumDisplayDevicesA
GetKeyboardLayoutList
GetSystemMetrics
advapi32
GetCurrentHwProfileA
crypt32
CryptProtectData
urlmon
ObtainUserAgentString
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 764B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ