PUP.Gamehack.GACH
Table of Contents
Analysis Report
General information
| Family Name: | PUP.Gamehack.GACH |
|---|---|
| Packers: | UPX x64 |
| Signature status: | No Signature |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
68c3312614042e0b8e8e276c7222b363
SHA1:
b59768fa3f8e9dccc7deba0a425c1d571be2c880
SHA256:
DEEA387213ED0F5CEBF1CD026E6A350C3D8DF5B023ABB63ECB4C6E835B551437
File Size:
4.01 MB, 4014080 bytes
|
|
MD5:
2e947de17584a2dad8351cbffc3ba31a
SHA1:
2ed8cb11beae7827c7bfc45a5a7e3cc8977fd0dd
SHA256:
5ECA58B2EE15D349F27B2123CBF3591A7AFB04D6AC824C9295330AC4B24810CE
File Size:
664.06 KB, 664064 bytes
|
|
MD5:
7a561f499f96f1eee9606de795007911
SHA1:
6c3f1449b7a1e25a7b781651a50ae56783e6f87f
SHA256:
99387E5D2189DF940632B5095043EE49E1086B787604A4B904EBB61549DB1827
File Size:
2.99 MB, 2987008 bytes
|
|
MD5:
9616bc3642d009996141cc21143ae40a
SHA1:
a6d72ef50a78c7e67e8ada5b6e0278d59d2178a3
SHA256:
A0CA016F6508612C19855557AAAD6823D4E340D8117506BDD8D1E13754E64401
File Size:
2.99 MB, 2987520 bytes
|
|
MD5:
4303eebe0d559eb8148f2f91e57a8746
SHA1:
1125fef8d1bad9d953187af36830bf6240bc66cf
SHA256:
55DA56E2B3C0C8594DD8262EBB044FECC9E45D3C9CB6F10F351258F63562C07C
File Size:
3.48 MB, 3481088 bytes
|
Show More
|
MD5:
26313b052964680df6c2b6fa7f35f68c
SHA1:
755cd7e61439384b91275fdb383e935daa968714
SHA256:
885643B42FA0EDD305569F475CA7D599763690FC585AF0FA9F7AE9CA7C5062F5
File Size:
268.80 KB, 268800 bytes
|
|
MD5:
a111e20ed810a3ed88631ddafc50ffee
SHA1:
a6ec9b37645798fb7920ef822af9a2fe9a89986c
SHA256:
ACC60566687BBF71A4920C6DBD0BC8C5B299CCF0681437BBCD32108B3697C15C
File Size:
585.22 KB, 585216 bytes
|
|
MD5:
b763a1fc3c3155fee714c6bb560f5869
SHA1:
bfea067e489ead42d0208afaf43d5e3a1eac5baf
SHA256:
073901B95187AEC80ECC4628AFE6E8861C3C931D89F2F9A212B344820AD7FFFE
File Size:
2.96 MB, 2963456 bytes
|
|
MD5:
9f39958160a49d8b243d867e60d0747a
SHA1:
083a062456886474188708062be6992b28d025d3
SHA256:
F228790C6CBABC5EB2C7B161CBDE7ED18BCBE395DFDB3F7B3E9C16C82A57814D
File Size:
416.77 KB, 416768 bytes
|
|
MD5:
c0e4a0d7d04a22746f401d0eddd04aea
SHA1:
6b2efe09c1e5d227ae00a93d225fb0657398238f
SHA256:
27076763912ADB66109EB128782F18160044D032D5C41F79A71B270FD2BD686C
File Size:
721.92 KB, 721920 bytes
|
|
MD5:
29cef61423cf1f10ea33ace806bd8827
SHA1:
9190115f3f2c489f07a213616ade8ed95d1cfd21
SHA256:
50CD608780A320283E42716FE14DD8FEA75CAB0BF1BAAECD2D5F22F60036777B
File Size:
406.53 KB, 406528 bytes
|
|
MD5:
6b931c961901b7d295c1a364005d7015
SHA1:
a4cea19c0040c77ef08f3f608763aa561a4e6790
SHA256:
C7292EE9DD360AB34497192FA55744E04FC4D82BF11073D03C5C4685B4533EE5
File Size:
514.05 KB, 514048 bytes
|
|
MD5:
f05742216755341960d870b847812ca2
SHA1:
5467d691a7cf07bde650b1b2f2ecaf9455cf2453
SHA256:
D2FCEE9F8D51AF04568B3CB9D043A8FB2E49EAFD37452D98580376C07CF34DE6
File Size:
3.70 MB, 3698688 bytes
|
|
MD5:
079f6271ba4fc92a643a332e9ad80132
SHA1:
7301e645a39ac34a755aa90e28a06b5eff94c155
SHA256:
9A74F9FF2DAB9F0A05E16164CAD544A725D802FAAE2277566F406C976D90F5B8
File Size:
5.85 MB, 5846016 bytes
|
|
MD5:
953ab37107092b1935ef4bbb311ff5e8
SHA1:
91466a10d9cf50b5342f5187b96f20f9abc881e5
SHA256:
7670EE14B86D8143304EBE3B0674F334683D6430A36E82525A60742D10DAE4BD
File Size:
6.61 MB, 6610944 bytes
|
|
MD5:
de1c2cbf0e534aea3f545c9213ef9101
SHA1:
3ae442db6a285095cfd3d6d03b816f5725d3e30f
SHA256:
6DC3F3DD607DF61599386E9D2F1E84A3D80685684E6A72FFD744049BF3759361
File Size:
3.69 MB, 3685888 bytes
|
|
MD5:
ecc8f97efa1e3b1818dd620affd069f3
SHA1:
14ed73551cb876f0f391834b52cf8ac82e4cf0ee
SHA256:
F1B2D66A70BE816CBB2CF16BFC2BF0FDBBA15599081CB04734FEDD4BAEF21269
File Size:
3.05 MB, 3049984 bytes
|
|
MD5:
f5cee20e8926d8059aa93858e7318dfa
SHA1:
5a02e82df464db39ea55963073115604f8ab54e2
SHA256:
3B1BB06EBAEC1371E5A43A686B29F9BC03963E8DE24788A0A6D94B5A83C7938D
File Size:
1.59 MB, 1591296 bytes
|
|
MD5:
c7def5efce9130df9bcf3b67b89522ba
SHA1:
df6ac9a86157d9ee361448af0b19b908c5860b26
SHA256:
14FCDC891F54EF17D32679B135D62BBA6C4F8073E809CC767679DC0C1FE08E32
File Size:
1.59 MB, 1586688 bytes
|
|
MD5:
f0b178d1fbfbd66ce85d0121d9750dce
SHA1:
27e11c6127ae5ae72e8d7a6cb9e4e26abe660999
SHA256:
EBB03C89E561953493357A6C74DC169998E604D1E09D1B5F052DB86B58CA284A
File Size:
4.68 MB, 4681728 bytes
|
|
MD5:
aaff2917a57194b8836cdddc7768df51
SHA1:
27ca28a49cc2b23da9d630e20b6736e3d1343b5d
SHA256:
8DCFAFCD374E3F312225DDAFE54E9BBD3FE6C18A81820CD7AD38C63F6FBCE2C2
File Size:
2.89 MB, 2890832 bytes
|
|
MD5:
eb24b73d2b255857521cc62620ac6312
SHA1:
56ca917a3fdc075c0d4d78af5b43cf475597da03
SHA256:
73BE6B43F22206760F63BAE2303F42372CA5FD57DFD1BCEFA0FDC419CA55E53A
File Size:
2.97 MB, 2969600 bytes
|
|
MD5:
ab2506c5dbd2838a902a583398ef6a5d
SHA1:
8f1785f1743f68208438bc7538a7532eca261276
SHA256:
5BE7BAE3ABC989448586B17C2A7C94F9F4D3B02328F07C08B6576891C3D3CF2C
File Size:
4.01 MB, 4014592 bytes
|
|
MD5:
13d38eb274b2187d3d976e3396b02191
SHA1:
b853a71887763d0e8068967e30158af7e4648853
SHA256:
3482AC2959D0A2B05B80775EE7C5A8D993DC9898789C20162DF8BB97F130A12D
File Size:
3.22 MB, 3215360 bytes
|
|
MD5:
1e1a0c74e79e0d4730f75d4908092cac
SHA1:
3f2ce4fc732e1316e02ea4d5f56ce6436a768a47
SHA256:
904E228E8DD620EDAF3B41F6385467F9D35125CE1511A20AEF13962C9B89DF30
File Size:
5.84 MB, 5844480 bytes
|
|
MD5:
6bfebfaa7f4a97e0b5d7a5ddffb762ea
SHA1:
114e365bb24184dbc8464a826efbe0b2f6c67fb1
SHA256:
74FF7FC562679770EC0FAC15875EA639BA494A82344CF59C872AF156BF5120EB
File Size:
3.42 MB, 3417600 bytes
|
|
MD5:
6a712f9b5f0f20c60e2310bfd639b9d9
SHA1:
460a075f33897631d69ca2d63cbdc00db5364ac4
SHA256:
F00A6B88DA6DE1674938288992A3DC97FD4F72F431DFCB81B72233ADEDF6DD22
File Size:
6.37 MB, 6373376 bytes
|
|
MD5:
8fd842cad9a343b345fc65e31f558e34
SHA1:
67cf335ef694c514d895715dea46d00c0e976cfb
SHA256:
21018B6988B6665CA8F290480BDE1F674EB47E82C484CB39F20D0B6A1BEF8CEF
File Size:
456.19 KB, 456192 bytes
|
|
MD5:
b906e1beecb42669597576ad524d1670
SHA1:
0f45027bb44e93528acaa157c1465a5ff90e0992
SHA256:
2D84DE3A1B65426854E49D02A07A3A22F8DB5B2846AA3674E94BE2C1031E8EF1
File Size:
4.68 MB, 4681728 bytes
|
|
MD5:
997000834456c0c55db378751ae14065
SHA1:
b23a918fa14940660b9dd17e4c1fe485233d100e
SHA256:
B09C50C26FB14D788ACCC2E548B28F077A141CA5E94D5F328DCD51D9C9757624
File Size:
401.74 KB, 401736 bytes
|
|
MD5:
836163f2875c5f301ee7cc5a07ddf0ad
SHA1:
ac72818004e4844a6ab5f94b09a06876a6b4c702
SHA256:
09D40BBBC58F9A450BC675190E965F51EE3702D41D9F6FEBF0A5EC96F28985E0
File Size:
2.40 MB, 2395136 bytes
|
|
MD5:
13daa6d605043919c997a4bdb78e917b
SHA1:
d7b18d0856b40c95bbc065efc25907c96f913b02
SHA256:
39BBF53621127DF8D214437967ADC98547274EF0E151C7CA93B878E54D2B6ADB
File Size:
3.08 MB, 3075584 bytes
|
|
MD5:
be7abbd59a6c0b5019660a12c26a12fe
SHA1:
839758112e9ad29889dbb9a8322cc193b8541856
SHA256:
E61EB2AC14B4CFF1B6664A7EEC9578EB82C18369E302C550D6E47F259B69BEC4
File Size:
3.42 MB, 3420160 bytes
|
|
MD5:
c336eda8d082bedf3eecd62230a93b96
SHA1:
a14b5afc4e6885e3aa8e186e1c71a8b211140e19
SHA256:
D21E9705CD53EBD9CDAABFDAB2E58B8367600F0B73354784EEEF77ECBEB8B9B4
File Size:
2.35 MB, 2348032 bytes
|
|
MD5:
263c7b63230911bf7a1d56da69eb3d56
SHA1:
8a0216d384760dd86bc058325659781b0cd468b5
SHA256:
045F317E008C9D3C11602F10083809293827A4DEE86E6F4FF6CCC0E1E3072EB3
File Size:
645.63 KB, 645632 bytes
|
|
MD5:
8695c0cde962374d44540bd7679ae806
SHA1:
9fe2543782ddbde057f30e725565108da49e4cf7
SHA256:
3A86501D6F67B6F98CB4CE2F34F9D6B808A9C687CB2E395DDEB890ECC819CEED
File Size:
561.66 KB, 561664 bytes
|
|
MD5:
76923d5a09b3d96507ed966f74c93546
SHA1:
84a6f3abee8c2e6210b810475b8d624c978661a1
SHA256:
34F57E6D595462204721569D5188B445919940BBE6E21D59D6FD5E0A2F2872E9
File Size:
1.35 MB, 1350656 bytes
|
|
MD5:
ffbddbad86d677cc6e138dae2f989862
SHA1:
3ba41b278f3adf694969277511a88615a09ed582
SHA256:
6438E2A42DE3C936F142B207E0DA613F14C4E197875AB1D9FCD81C3FE5D0568D
File Size:
333.31 KB, 333312 bytes
|
|
MD5:
72e43351b5356439ac0653997264a776
SHA1:
fe68db0f7135fa273a3c061e3407fc1b0cb8aa4c
SHA256:
66A8E9E0C0B83DAC0C09C24C2C361A86AD66177AC40E9E5B91178D594C1B24DF
File Size:
2.98 MB, 2982400 bytes
|
|
MD5:
486417b70804d77ffc8de97bd5a765f2
SHA1:
fb966dacdbb48e287f2598a3cd6e8fb3e5219897
SHA256:
2B07441275992725D932D4EFE00EC7412A4C3DC930D14E1C18A0C8B1CFEAC71B
File Size:
1.34 MB, 1339392 bytes
|
|
MD5:
4b5e241d91693da56c252e39bc787c30
SHA1:
639e6a78422e269aa60aebffab97bc1dbefedc46
SHA256:
4174DB02CE366B5AC48DBC8FC38B072D360F67B05DFCFA2561A71D8F045ADC74
File Size:
2.55 MB, 2548736 bytes
|
|
MD5:
60b9519d4a203900f8ab01537773a8ab
SHA1:
ab10fc64b0d9776e17144fb175630df30fd93896
SHA256:
83E1260846F10E20CFBAD994C3DC18D84F6180AE66157661ED6694D4A8423C78
File Size:
268.29 KB, 268288 bytes
|
|
MD5:
e7e9b32df22d89d9b94b9c29be91c5e5
SHA1:
ca5968fbcc5bfcee8b1993ef1ae139471414cc43
SHA256:
DA2BBF1F934337481E973D8DEC40901E923E97AA175BDF3F582270AB120CA253
File Size:
6.37 MB, 6373376 bytes
|
|
MD5:
b6ac380a62dec3775584c64754b083fd
SHA1:
e9b0966c3cbede797b5f6bd420f0f66347183fdb
SHA256:
24129130C02B5B1709FAB77C54CAEADA971551FCE530456F701637D10F834413
File Size:
1.82 MB, 1823232 bytes
|
|
MD5:
8ba35e03df5c0a2f9f78186952ec4803
SHA1:
0dfa988f6351ef22405f375e43af1c4423548129
SHA256:
DE9EAD4FFDEE03E90878CBE963A8213BC358DF3CC6483A894472580D604D43B9
File Size:
3.65 MB, 3654144 bytes
|
|
MD5:
f2743e97413b6d19858571b2cfb4d3ac
SHA1:
27c280f42e6ef9adf6dbcf70b922a228d43684e5
SHA256:
35D196EA0499A2672987F1E36557C98DF966F2CADE8FAD269DF70D4F61CA5CBD
File Size:
2.96 MB, 2963456 bytes
|
|
MD5:
82df11b1b881dfd9289ffb6ce7e06ac1
SHA1:
bac1c2d96119916b5e20a39b67ebcbd0623e08f3
SHA256:
3F2CC1487B60DD320772E7FE92346F346995F0CD3D423C80548D5F02ACF4BAFF
File Size:
6.00 MB, 5996544 bytes
|
|
MD5:
599cc24fb4d5f733b6aa07f76e320e02
SHA1:
fef8824668e77386909aafc433e74eb995d74774
SHA256:
FDF6E57A619A43056574D6361CE90AC05B53A3D0036566438D9C986926C80E05
File Size:
2.61 MB, 2609664 bytes
|
|
MD5:
4be55f3645449cfb42a1a011a537ca59
SHA1:
748b742d7da0914623d9167357cc0cc3e9082ee9
SHA256:
567E7D226268F32CEF220B1849BCEE653F13E0F2532BD48A4F9B819077D93DF3
File Size:
6.82 MB, 6819328 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have debug information
- File doesn't have exports table
- File doesn't have relocations information
- File doesn't have resources
- File doesn't have security information
- File has been packed
- File has exports table
- File has TLS information
- File is 64-bit executable
Show More
- File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
- File is Native application (NOT .NET application)
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Icons
File Icons
This section displays icon resources found within family samples. Malware often replicates icons commonly associated with legitimate software to mislead users into believing the malware is safe.Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Name | Value |
|---|---|
| Comments | https://mul0.com/ |
| Company Name |
|
| File Description |
|
| File Version |
|
| Internal Name |
|
| Legal Copyright |
|
| Legal Trademarks | Tsuda Kageyu |
| Original Filename |
|
| Product Name |
|
| Product Version |
|
Digital Signatures
Digital Signatures
This section lists digital signatures that are attached to samples within this family. When analyzing and verifying digital signatures, it is important to confirm that the signature’s root authority is a well-known and trustworthy entity and that the status of the signature is good. Malware is often signed with non-trustworthy “Self Signed” digital signatures (which can be easily created by a malware author with no verification). Malware may also be signed by legitimate signatures that have an invalid status, and by signatures from questionable root authorities with fake or misleading “Signer” names.| Signer | Root | Status |
|---|---|---|
| Lisa Gamble | SSL.com Root Certification Authority RSA | Root Not Trusted |
File Traits
- 2+ executable sections
- big overlay
- dll
- fptable
- GetConsoleWindow
- HighEntropy
- imgui
- Installer Version
- No Version Info
- ntdll
Show More
- VirtualQueryEx
- WriteProcessMemory
- x64
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.| Total Blocks: | 38,141 |
|---|---|
| Potentially Malicious Blocks: | 41 |
| Whitelisted Blocks: | 34,728 |
| Unknown Blocks: | 3,372 |
Visual Map
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
1
0
0
1
0
0
1
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
1
1
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
1
0
0
0
0
0
0
0
1
1
0
1
1
0
0
0
0
0
0
1
1
1
0
0
0
1
0
0
0
0
0
1
1
1
1
0
0
0
0
0
0
0
0
0
0
0
0
1
1
0
1
1
0
0
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
1
1
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
1
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
?
0
0
0
0
0
0
0
0
0
0
x
x
x
x
0
0
0
0
0
?
0
?
x
x
?
?
0
0
0
0
0
0
0
1
1
1
0
0
0
0
0
0
x
?
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
?
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
?
?
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
?
0
?
?
?
0
0
0
?
?
?
?
?
?
?
0
0
0
1
0
0
0
1
?
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
?
?
0
0
0
0
?
?
0
0
0
0
?
0
0
0
0
1
0
?
0
1
?
0
1
?
1
?
0
0
0
?
0
?
?
?
?
0
?
?
0
0
0
?
0
?
?
0
0
?
?
?
0
0
0
0
0
?
?
?
0
0
?
0
?
?
?
?
0
?
?
?
?
0
?
?
?
?
?
0
?
0
?
0
0
?
?
?
?
?
?
?
0
?
0
?
0
?
0
?
0
0
?
0
?
0
?
0
1
0
0
0
?
?
1
0
0
?
0
?
0
0
0
?
?
0
?
?
0
0
0
0
0
0
?
0
0
?
?
0
?
0
0
0
0
0
0
0
?
0
?
0
0
0
?
0
0
?
0
?
0
0
0
?
0
0
0
0
?
?
?
0
0
0
0
?
0
0
0
0
?
0
0
0
0
?
0
0
0
0
?
0
0
0
0
0
?
0
0
?
0
0
0
?
0
0
0
?
0
0
0
?
0
0
0
?
0
0
0
?
0
?
0
0
?
0
?
0
0
0
?
0
?
0
0
?
0
0
0
0
0
0
0
0
0
0
0
0
0
0
?
0
0
?
0
?
0
0
0
?
0
?
0
0
?
0
0
?
0
0
0
0
?
?
?
0
?
?
?
?
0
0
0
0
?
0
0
?
?
?
?
0
?
?
0
0
0
?
0
0
0
?
0
?
?
?
0
?
0
?
0
?
?
?
0
?
?
0
?
0
0
?
0
?
0
0
0
?
0
?
0
0
?
0
0
0
0
?
0
0
0
0
0
?
0
?
?
0
0
0
0
0
0
0
?
0
?
0
?
?
0
?
0
0
0
0
0
0
0
0
?
0
0
?
0
0
?
0
0
?
0
0
?
0
?
0
0
?
0
0
0
0
0
0
?
0
0
?
?
0
0
?
0
?
0
?
0
0
?
?
0
?
?
0
0
0
0
?
?
?
?
0
0
0
0
0
0
0
?
0
0
1
0
0
0
1
0
0
0
0
0
0
?
0
0
0
0
0
0
?
0
0
0
0
?
0
0
?
0
1
0
0
?
0
0
?
0
0
0
?
?
1
0
?
?
0
0
0
?
0
0
0
0
x
?
0
0
0
0
?
0
?
0
?
?
0
0
0
?
0
0
?
0
0
0
0
0
0
1
0
0
?
0
0
0
0
0
?
?
0
0
1
0
0
1
0
0
1
0
0
?
?
0
?
?
?
0
1
0
?
?
0
?
0
?
0
x
?
0
?
0
0
0
0
0
0
?
?
0
?
0
?
?
0
0
0
0
0
0
?
0
0
0
?
x
0
?
0
?
0
?
?
?
0
0
?
0
0
0
0
0
?
0
?
0
0
0
?
0
0
0
?
?
0
?
0
?
1
?
?
?
0
?
0
?
?
?
0
?
0
0
0
0
0
0
0
0
?
0
?
0
0
0
?
0
0
0
?
0
0
0
0
0
0
0
?
?
1
?
0
0
0
0
0
0
0
?
?
0
?
?
0
?
0
0
0
1
1
0
0
?
0
?
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
?
?
?
0
0
0
?
?
0
0
?
?
0
0
0
0
0
0
0
0
0
?
?
?
0
?
0
?
0
?
?
?
?
0
0
0
0
0
0
?
?
0
1
?
?
?
?
?
0
1
?
0
?
0
0
0
0
?
?
0
0
?
?
?
?
0
1
0
?
0
1
0
0
?
?
0
?
?
0
1
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
?
0
0
0
0
0
0
0
0
0
0
0
0
0
0
?
?
0
0
?
0
0
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
0
?
?
?
1
?
?
0
?
?
?
0
0
1
1
0
0
0
0
?
?
?
?
0
?
?
0
?
?
?
0
0
1
0
?
?
?
?
0
?
?
?
0
?
0
?
0
?
0
0
0
0
0
0
?
?
?
?
0
?
0
?
0
?
0
?
?
?
0
?
0
?
?
0
?
0
?
0
0
?
0
?
0
0
0
0
?
0
?
0
1
0
0
0
1
0
0
0
0
0
0
0
0
0
0
?
?
0
?
1
1
0
0
0
0
?
?
?
?
0
0
0
0
?
0
0
0
0
0
?
0
0
?
0
?
0
?
?
0
?
0
0
?
?
?
0
?
0
?
0
?
?
?
?
0
0
?
0
?
0
0
0
0
0
?
0
?
0
?
?
?
?
0
?
?
?
0
0
?
?
?
?
0
1
1
0
0
1
0
?
?
0
?
?
0
0
0
?
?
?
?
?
0
?
?
?
0
?
?
?
?
0
0
0
0
?
0
0
0
1
0
0
?
0
?
0
?
?
?
0
0
?
0
0
1
0
?
?
1
0
0
?
1
0
?
?
0
0
1
1
0
?
0
?
?
0
0
0
1
1
1
0
?
?
1
0
0
0
0
?
?
?
0
0
?
0
?
0
?
0
?
0
1
1
0
0
?
0
0
0
0
0
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
0
?
?
?
?
?
0
0
0
0
1
0
?
?
0
0
0
0
1
0
0
0
0
?
...
Data truncated
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block
? - Unknown Block
x - Potentially Malicious Block
Similar Families
Similar Families
This section lists other families that share similarities with this family, based on EnigmaSoft’s analysis. Many malware families are created from the same malware toolkits and use the same packing and encryption techniques but uniquely extend functionality. Similar families may also share source code, attributes, icons, subcomponents, compromised and/or invalid digital signatures, and network characteristics. Researchers leverage these similarities to rapidly and effectively triage file samples and extend malware detection rules.- Agent.KFP
- Gamehack.GADA
- Injector.KFSC
- Kryptik.EFJ
- TelegramHack.C
Files Modified
Files Modified
This section lists files that were created, modified, moved and/or deleted by samples in this family. File system activity can provide valuable insight into how malware functions on the operating system.| File | Attributes |
|---|---|
| \device\namedpipe\gmdasllogger | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\120a378b-65d0-43e3-82b5-206674d078db.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\120a378b-65d0-43e3-82b5-206674d078db.tmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\5d87e86d-fc5e-4d81-9a71-d9c5669c0c97.csl | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\5d87e86d-fc5e-4d81-9a71-d9c5669c0c97.csl | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\61a1fbf67eca43459f1ad54d68280ba5.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete |
| c:\users\user\appdata\local\temp\855814e0a56449b389ef22cc37dac8e6\{86eea894-5bcd-434a-8c64-f49663c21ccd} | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\8d4e7386ef9040faad30b7dacaed58bb.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete |
| c:\users\user\appdata\local\temp\ffa69f178aa9447c8d58b2acc8800958.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete |
| c:\users\user\appdata\roaming\16c525f4-b7e5-41ed-b0d4-82ee29c3be2d.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data |
Show More
| c:\users\user\appdata\roaming\16c525f4-b7e5-41ed-b0d4-82ee29c3be2d.tmp | Synchronize,Write Attributes |
| c:\users\user\appdata\roaming\neos eureka s.r.l\eurekalog\bug reports\748b742d7da0914623d9167357cc0cc3e9082ee9_0006819328\748b742d7da0914623d9167357cc0cc3e9082ee9_0006819328.el | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\roaming\neos eureka s.r.l\eurekalog\bug reports\748b742d7da0914623d9167357cc0cc3e9082ee9_0006819328\748b742d7da0914623d9167357cc0cc3e9082ee9_0006819328.el | Synchronize,Write Attributes |
| c:\users\user\downloads\log.txt | Generic Write,Read Attributes |
| c:\windows\system32\haxsdk-logs.txt | Generic Write,Read Attributes |
| c:\windows\system32\haxsdk-logs.txt | Read Attributes,Synchronize,Write Attributes,Delete |
| c:\windows\system32\haxsdk-prev-logs.txt | Read Attributes,Synchronize,Write Attributes,Delete |
| c:\windows\system32\reboot.log | Generic Write,Read Attributes |
Registry Modifications
Registry Modifications
This section lists registry keys and values that were created, modified and/or deleted by samples in this family. Windows Registry activity can provide valuable insight into malware functionality. Additionally, malware often creates registry values to allow itself to automatically start and indefinitely persist after an initial infection has compromised the system.| Key::Value | Data | API Name |
|---|---|---|
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 뜓붠䰂ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 荓燈䱯ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 䀺毺ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | ᒿ䂟毺ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | ᖛ쏫盝ǜ | RegNtPreCreateKey |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 | RegNtPreCreateKey | |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 놟豌詨ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 킕ꌝǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 䃡ፐ쩓ǜ | RegNtPreCreateKey |
| HKCU\software\eurekalab\eurekalog\7.0::machineid | 죎搏ڴ伂ᖻ쇒멚 | RegNtPreCreateKey |
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Syscall Use |
Show More
135 additional items are not displayed above. |
| Process Terminate |
|
| Anti Debug |
|
| Keyboard Access |
|
| User Data Access |
|
| Process Manipulation Evasion |
|
| Process Shell Execute |
|
| Network Winsock2 |
|
| Network Winsock |
|
| Network Info Queried |
|
Shell Command Execution
Shell Command Execution
This section lists Windows shell commands that are run by the samples in this family. Windows Shell commands are often leveraged by malware for nefarious purposes and can be used to elevate security privileges, download and launch other malware, exploit vulnerabilities, collect and exfiltrate data, and hide malicious activity.
C:\WINDOWS\system32\mode.com mode con: cols=90 lines=26
|
WriteConsole: Access is denied
|
C:\WINDOWS\system32\cmd.exe C:\WINDOWS\system32\cmd.exe /c cls
|