Overview
overview
10Static
static
10ValorantEx...in.zip
windows10-ltsc 2021-x64
10ValorantEx...ot.hpp
windows10-ltsc 2021-x64
3ValorantEx...es.hpp
windows10-ltsc 2021-x64
3ValorantEx...re.cpp
windows10-ltsc 2021-x64
3ValorantEx...re.hpp
windows10-ltsc 2021-x64
3ValorantEx...pi.hpp
windows10-ltsc 2021-x64
3ValorantEx...ICENSE
windows10-ltsc 2021-x64
1ValorantEx...er.exe
windows10-ltsc 2021-x64
10ValorantEx...DME.md
windows10-ltsc 2021-x64
3ValorantEx...th.hpp
windows10-ltsc 2021-x64
3ValorantEx...ok.cpp
windows10-ltsc 2021-x64
3ValorantEx...ok.hpp
windows10-ltsc 2021-x64
3ValorantEx...in.cpp
windows10-ltsc 2021-x64
3Analysis
-
max time kernel
99s -
max time network
140s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
21-01-2025 19:21
Behavioral task
behavioral1
Sample
ValorantExternalCheat-main.zip
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral2
Sample
ValorantExternalCheat-main/Aimbot.hpp
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral3
Sample
ValorantExternalCheat-main/Classes.hpp
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral4
Sample
ValorantExternalCheat-main/Core.cpp
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral5
Sample
ValorantExternalCheat-main/Core.hpp
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral6
Sample
ValorantExternalCheat-main/CustomWinApi.hpp
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral7
Sample
ValorantExternalCheat-main/LICENSE
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral8
Sample
ValorantExternalCheat-main/Loader.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral9
Sample
ValorantExternalCheat-main/README.md
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral10
Sample
ValorantExternalCheat-main/auth.hpp
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral11
Sample
ValorantExternalCheat-main/d3d_Hook.cpp
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral12
Sample
ValorantExternalCheat-main/d3d_Hook.hpp
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral13
Sample
ValorantExternalCheat-main/dllmain.cpp
Resource
win10ltsc2021-20250113-en
General
-
Target
ValorantExternalCheat-main/Loader.exe
-
Size
489KB
-
MD5
d685ae29670dbc00b6665b5511bda6cb
-
SHA1
2f49b83a6d7a5f9e5151c6f7f1b3fa9e6f4b25a9
-
SHA256
0518c095cc948ab003cd4d12a1f95f0579c52c17f9102976b5799cd0bd85e6a2
-
SHA512
d7705fcd8751a49cc17962ac9b6e228f55ef74aab066cabdd5de74518686feaea951487a042683ea3e055ce04e0b971b528572aac920f325fcf64d34167450de
-
SSDEEP
12288:uiNSSLq47oIkbTUINbTDw7j/puQ/FU5A8e2CI582g/c10/nGZj:uicGq47oDwgbTDGjxJ/2i8MI
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
https://undesirabkel.click/api
Extracted
lumma
https://undesirabkel.click/api
Signatures
-
Lumma family
-
Loads dropped DLL 1 IoCs
pid Process 5000 Loader.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5000 set thread context of 3876 5000 Loader.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 5000 wrote to memory of 3876 5000 Loader.exe 85 PID 5000 wrote to memory of 3876 5000 Loader.exe 85 PID 5000 wrote to memory of 3876 5000 Loader.exe 85 PID 5000 wrote to memory of 3876 5000 Loader.exe 85 PID 5000 wrote to memory of 3876 5000 Loader.exe 85 PID 5000 wrote to memory of 3876 5000 Loader.exe 85 PID 5000 wrote to memory of 3876 5000 Loader.exe 85 PID 5000 wrote to memory of 3876 5000 Loader.exe 85 PID 5000 wrote to memory of 3876 5000 Loader.exe 85 PID 5000 wrote to memory of 3876 5000 Loader.exe 85 PID 5000 wrote to memory of 3876 5000 Loader.exe 85 PID 5000 wrote to memory of 3876 5000 Loader.exe 85 PID 5000 wrote to memory of 3876 5000 Loader.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\ValorantExternalCheat-main\Loader.exe"C:\Users\Admin\AppData\Local\Temp\ValorantExternalCheat-main\Loader.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
428KB
MD536c0b5018242a87d99e2b5000dfc29ad
SHA1d46f1ba661e3d18c8b1e7895920368e9bddbc7ae
SHA25694cc3d303105493943c6cce20473c82eff3942515bfd73df976e802d97be78b4
SHA5128f10af3f519e2c52539fb79ec16cd82470f25c0863b622030ed4bd59f437c9109caf46d151c18889c4939a44672339d75029c8f757cf7118e759b90355317f0a