General
-
Target
valaront cheat finder.exe
-
Size
6.0MB
-
Sample
250209-vzb6dsxrcv
-
MD5
b964db90f7aade728c38ca1520dc6b92
-
SHA1
4dc372a23c29f0ffbd5b3f1ef4c4a352d559fa2b
-
SHA256
faf3d62be651cd01ca611f3d6ba62d304e3535e5b065507de4d37420bf8ede3e
-
SHA512
cceaf5f8fe162b940cdc470df23f04e2b42dcdbed1428287858d97e757616fd1da402b7140b7e5eac9ea3ad6175b90727241dd327c06a11da12fbca61ae7279f
-
SSDEEP
98304:JlEtdFBBZamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4REPMrh38Mg8Gj:JcFj0eN/FJMIDJf0gsAGK4REkrpg8Gj
Behavioral task
behavioral1
Sample
valaront cheat finder.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
valaront cheat finder.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral3
Sample
�d�y�k.pyc
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
�d�y�k.pyc
Resource
win10v2004-20250207-en
Malware Config
Targets
-
-
Target
valaront cheat finder.exe
-
Size
6.0MB
-
MD5
b964db90f7aade728c38ca1520dc6b92
-
SHA1
4dc372a23c29f0ffbd5b3f1ef4c4a352d559fa2b
-
SHA256
faf3d62be651cd01ca611f3d6ba62d304e3535e5b065507de4d37420bf8ede3e
-
SHA512
cceaf5f8fe162b940cdc470df23f04e2b42dcdbed1428287858d97e757616fd1da402b7140b7e5eac9ea3ad6175b90727241dd327c06a11da12fbca61ae7279f
-
SSDEEP
98304:JlEtdFBBZamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4REPMrh38Mg8Gj:JcFj0eN/FJMIDJf0gsAGK4REkrpg8Gj
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
-
-
Target
�d�y�k.pyc
-
Size
857B
-
MD5
f5809ef2c594c2d85555a07c31d7d6d0
-
SHA1
f518e2f5313186dc7bbecf8681c7003f36be5321
-
SHA256
61b023797e6283e4c7c7565f09d8c355dfe4a61ae235a40e5e8743dbdd619124
-
SHA512
f3a2d4e991136af5cdea634efc25bcf928da87ac0ae8a3b099b53d162da07b6660a56f9f04d84a716381c41e7d1ff050defe18005227ef3cac5ab3e817394f02
Score1/10 -