cabalmain.exe

First submission 2024-10-15 19:23:15

File details

File type: PE32 executable (GUI) Intel 80386, for MS Windows
Mime type: application/x-dosexec
File size: 38527.0 KB (39451648 bytes)
Compile time: 2012-09-05 07:39:48
MD5: 12ebc1ac491e6ba72fb2d57e22d9a916
SHA1: aca86b37ded0c84655d799f69d5be8b016fae8bb
SHA256: 684d279c12834092808e212bbbdab69308da260917ac135e962cfc90afbf44f5
Import Hash : 57467bbebe360712f0cc6be70ccffc3b
Sections 23 .text .rdata .data .rsrc .idata .edata .NewIT .NewIT .NewIT .NewIT .NewIT .NewIT .NewIT .NewIT .NewIT .NewIT .NewIT .NewIT .NewIT .newimp .NewIT .enigma1 .enigma2
Directories 4 import export resource tls

File features detected

Is DLL
Packers
Anti Debug
Anti VM
Signed
XOR

OSINT Enrichments

Virus Total: 22/76 VT report date: 2024-10-14 14:34:40
Malware Type 1 trojan

URLs, FQDN and IP indicators 1

URL Host (FQDN/IP) Date Added
hXXp://vps-5fc33f45.vps.ovh.ca/output/client/cabalmain.exe VirusTotal Report vps-5fc33f45.vps.ovh.ca VirusTotal Report 2024-10-15 19:23:15

PE Sections 6 suspicious

Name VAddress VSize Size SHA1 MD5 Suspicious
.text 0x1000 0x6c4000 7094272 6bab3a14c91dbe64eeca9f5337c083347104b6c8 c6953eff491bd70c6da05d18da1baa61
.rdata 0x6c5000 0x9c000 638976 b6d80d3cedcb217cd9a62b0759f123a8caded993 ebba6d81ff776c16cd882bdfdb173de8
.data 0x761000 0x589000 5804032 1dfd8399757df8458bf1cde5c6694e6a24581696 92022bf655a5f0dda0f1e4687588b3e7
.rsrc 0xcea000 0x4ad8 19456 33c41d5dc4ea66ce576d906cf2e613d832e9bda9 f1f0b03cfa880c0ca90f9d0e9bdfe023
.idata 0xcef000 0x3000 12288 53420575c59773785a403cd119c19abc9c54ee2c 0b60376bf65fb636400e8ba44132735a
.edata 0xcf2000 0x1200 4608 21e4bda26b1b39d6733655aca125c2f3dfd0392c 46822c0cd404725d71c7441a076f7572
.NewIT 0xcf4000 0x200 512 344ea10bc2261e9a23478d506681bc5b56ce6fb5 4911bf421c71c030304a54daa2e827d7
.NewIT 0xcf5000 0x200 512 f53580bcbef907e1c7641a50067f019b45ec372f 356c6579f30d25d8ed60b64135df0da7
.NewIT 0xcf6000 0x200 512 5778332504d4f63ad07809429d2f94f7efc6f1f7 308fcf4325cee8fc490409c79d264f4b
.NewIT 0xcf7000 0x1200 4608 afd3d39ea3b7b69b8700dd9e672f4cd838f23839 7dd447f0a0319f5454d6c24d1b1414a4
.NewIT 0xcf9000 0x200 512 1bee8bc0d7bf5ad081746e33469d5948acee3870 a839aa0f4bc94755e7eef292e24fe8df
.NewIT 0xcfa000 0x200 512 94b13afeeb6ffdc2651b0b902c64e5ca21157b14 6e7a3130518588bd987b3579a769e998
.NewIT 0xcfb000 0x200 512 3215cbd7e12f16d49c02caacf6b90d515ab970cc e91b95e1b1b043a6d1204550a773e6f9
.NewIT 0xcfc000 0x200 512 568ede179b13c350eea608af5529a23254065b46 6af8bad11e54c8d9b5aea1c9ed9b3d3a
.NewIT 0xcfd000 0x200 512 539fbb18b745f98298c1aaf3f09092f40a488c39 e499108c3c22877e863b1f13e30a0968
.NewIT 0xcfe000 0x200 512 575a0395653df831072b7420098c6fb1d0b3c1f1 564bfcad8b9602e35f31d8cdcc411a1b
.NewIT 0xcff000 0x200 512 c3145e855adf4fec1f5a6efdbb7ee2b244be6d27 2c0dccca25e9f203742cd0cbae2812c7
.NewIT 0xd00000 0x200 512 3373a8ead13f5bafc3d7099a82239fdea184dbe8 720b1cd3035582895e702179669ecf09
.NewIT 0xd01000 0x400 1024 5826f84c4c049583b008915b5513f4c49486c997 8ebc312fac9deb66746876d16926c4a3
.newimp 0xd02000 0x1000 4096 e8efb3692ea8c88f21105e8410a745ddfd96d38f cc17126e304a009a32d0ba06df761d46
.NewIT 0xd03000 0x21ff 8704 a005b327b7314377a38fe99fec0f32ddb4b979c7 96e341bc502b5d0d084a090fa59e98d9
.enigma1 0xd06000 0x1000 25563136 3365da712c94658a08071f084d00074aeab6778c f2778b86555a71940fd24e3551fabb86
.enigma2 0xd07000 0x46000 286720 df2a638a460c386497b394fc96b3aade21f27749 34ed7166689af1fcc37e2bacb1ae015c

PE Resources 5

Name Language Sublanguage Offset Size Data
RT_ICON LANG_ENGLISH SUBLANG_ENGLISH_US 0xcec0a0 9640
RT_ACCELERATOR LANG_ENGLISH SUBLANG_ENGLISH_US 0xcee648 8
RT_GROUP_ICON LANG_ENGLISH SUBLANG_ENGLISH_US 0xcee650 62
RT_VERSION LANG_KOREAN SUBLANG_KOREAN 0xcee690 652
RT_MANIFEST LANG_ENGLISH SUBLANG_ENGLISH_US 0xcee91c 444

Meta infos 8

LegalCopyright: Copyright (C) 2004
InternalName: Snake
FileVersion: 1.0.0.374
FileDescription: CABAL Online
Translation: 0x0412 0x04b0
ProductName: Snake Application
OriginalFilename: Snake.exe
ProductVersion: 1. 0. 0. 9000

Anti debug functions 3

GetLastError
RaiseException
UnhandledExceptionFilter

Anti debug functions 4

Virtual Box
VMware trick
VMCheck.dll
Bochs & QEmu CPUID Trick

Strings analysis - File found

Log
TempFileLog_%d.log
\Agreement.log
.log
RandomWarp.log
CabalError.log
Memory.log
Temporary
evb*.tmp
Data
>\mainEX.dat
maplink_%d.dat
%s\UI\Map\HField%02d.dat
%s\UserData\dlog.dat
\ui.dat
keymap_%d.dat
\usersetting.dat
ui_%d.dat
\mainex.dat
\main.dat
macrosay_%d.dat
XML
http://twitter.com/saved_searches/create.xml
http://twitter.com/saved_searches.xml
http://twitter.com/statuses/friends.xml
http://twitter.com/statuses/featured.xml
http://twitter.com/favorites.xml
http://twitter.com/friends/ids.xml
http://api.twitpic.com/1/uploadAndPost.xml
http://twitter.com/account/rate_limit_status.xml
StaticsInfo.xml
http://twitter.com/statuses/friends_timeline.xml
http://twitter.com/friendships/create.xml
http://twitter.com/account/end_session.xml
http://twitter.com/friendships/show.xml
http://twitter.com/statuses/mentions.xml
http://twitter.com/users/show.xml
http://twitter.com/direct_messages/new.xml
http://twitter.com/direct_messages/sent.xml
http://twitter.com/statuses/followers.xml
http://twitter.com/statuses/update.xml
http://twitter.com/account/verify_credentials.xml
http://twitter.com/statuses/public_timeline.xml
http://twitter.com/direct_messages.xml
http://twitter.com/friendships/destroy.xml
http://twitter.com/followers/ids.xml
http://twitter.com/statuses/user_timeline.xml
Database
'P.dB
Text
\CheckFileLog.txt
zeeLog.txt
1Hardware_Banlist.txt
internal.txt
GameGuard/Log.txt
StaticsInfo.txt
Library
DevUno.dll
d3dx10_43.dll
GilasCabal.dll
1zDisplay1.dll
d3d9.dll
api-ms-win-core-synch-l1-2-0.dll
D3DX10.dll
auom.dll
dbghelp.dll
atl90.dll
Codex.dll
mscoree.dll
d3dx11_43.dll
raw4d.dll
d3dx9_30.dll
Se7eN.dll
raw5d.dll
6thSe7eN.dll
ntdll.dll
USER32.dll
KERNEL32.dll
D3DX11.dll
zDisplay1.dll
zDisplay.dll
raw3d.dll
d3dx9_43.dll
D3DX9D.dll
rawHd.dll
test.dll
speedhack.dll
WS2_32.dll
Dll1.dll
SenpaiNicky.dll
d3dx9_31.dll
Libfiles.dll
macro.dll
D3DCompiler_43.dll
WININET.dll
hack-speed.dll
GDI32.dll
GameGuard/Minimizer.dll
CabalDiscordRPC.dll
ole32.dll
hackspeed.dll
api-ms-win-crt-runtime-l1-1-0.dll
speed_hack.dll
usp10.dll
neo.dll
fmodex.dll
OLEAUT32.dll
CheatEngine.dll
CabalDev.dll
shfolder.dll
api-ms-win-crt-time-l1-1-0.dll
xpva06.dll
ADVAPI32.dll
game.dll
unknown.dll
SHLWAPI.dll
bike.dll
IMM32.dll
Azura.dll
msvcp140.dll
SHELL32.dll
speed-hack.dll
c.e.dll
GameGuard.dll
XTrapVa.dll
IPHLPAPI.DLL
XPva03.dll
wpepro.dll
Glow.dll
DDRAW.dll
Cr4ck3r.dll
DINPUT8.dll
Skill_Passive.dll
*.dll
hack_speed.dll
d3d10.dll
dream.dll
urlmon.dll
cConfig.dll
WINMM.dll
api-ms-win-crt-stdio-l1-1-0.dll
System.dll
ViMD3DLib.dll
\imm32.dll
sxs.dll
custom.dll
RDR.dll
blau.dll
zDisplay2.dll
Engine.dll
Rework.dll
loaderx86.dll
custom_protected.dll
vcruntime140.dll
wpeprospy.dll
d3d9d.dll
MSVCRT.dll
PSAPI.DLL
WindowsCodecs.dll
smoll.dll
hack.dll
api-ms-win-crt-heap-l1-1-0.dll
VERSION.dll
Cheat.dll
d3d10_1.dll
Fd3dcompiler_43.dll
Web Page
Codex/ServerSideBan/Renew.php
http://localhost:8090/Codex/HackSplash/Splash.php

Strings analysis - Possible IPs found 4

1.0.0.1
211.115.86.66
139.99.88.173
121.14.13.139

Strings analysis - Possible URLs found 98

http://s.symcb.com/universal-root.crl0
http://twitter.com/friendships/show.xml
http://pki-ocsp.symauth.com0
http://twitter.com/direct_messages/sent.xml
http://www.microsoft.com/PKI/docs/CPS/default.htm0@
http://www.w3.org/2001/XMLSchema-instance
http://localhost:8090/Codex/HackSplash/Splash.php
http://twitter.com/statuses/friends_timeline.xml
http://www.cabal.co.kr/Helper/InsertHackingUserLog
http://www.cabal.co.kr/Helper/InsertSAS
http://twitter.com/account/end_session.xml
http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl0Z
http://www.w3.org/2005/08/addressing
http://twitter.com/saved_searches/create.xml
http://www.cabal.co.kr/Helper/SetGmsLicenseAlertLog
http://www.cabal.co.kr/Helper/InsertHackingUserLog2
http://twitter.com/friendships/destroy.xml
http://api.twitter.com/oauth/access_token
http://twitter.com/friends/ids.xml
http://twitter.com/statuses/mentions.xml
http://www.microsoft.com/pki/certs/MicTimStaPCA_2010-07-01.crt0
http://sns.cabal.co.kr/board/InsertBoard
https://devblogs.microsoft.com/directx/
http://cabalclose/
http://schemas.xmlsoap.org/ws/2005/02/trust/Issue</wst:RequestType
https://gilas-cabal.online/#!download
http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
https://d.symcb.com/cps0%
http://
http://www.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt0
http://www.w3.org/2003/05/soap-envelope/role/next
http://www.cabal.co.kr/Helper/CabalClientHelper.asmx
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl0
http://twitter.com/saved_searches.xml
http://api.twitter.com/oauth/authorize
http://twitter.com/favorites/destroy/
http://search.twitter.com/search.atom
http://twitter.com/saved_searches/destroy/
http://schemas.xmlsoap.org/soap/actor/next
http://twitter.com/favorites.xml
http://www.cabal.co.kr/Helper/InsertRPTLog
http://twitter.com/statuses/public_timeline.xml
http://www.w3.org/2001/XMLSchema
http://twitter.com/friendships/create.xml
http://twitter.com/statuses/featured.xml
http://twitter.com/statuses/followers.xml
http://twitter.com/favorites/create/
http://twitter.com/blocks/destroy/
http://twitter.com/statuses/update.xml
http://schemas.xmlsoap.org/ws/2005/02/sc
http://www.w3.org/2003/05/soap-encoding
http://schemas.xmlsoap.org/soap/encoding/
http://twitter.com/saved_searches/show/
http://schemas.microsoft.com/Passport/SoapServices/PPCRL
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
https://www.facebook.com/antii93
http://www.microsoft.com/pki/certs/MicRooCerAut2011_2011_03_22.crt0
http://crl.verisign.com/ThawteTimestampingCA.crl0
http://s.symcd.com06
http://twitter.com/statuses/friends.xml
http://icanhazip.com/
https://d.symcb.com/rpa0@
http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.crl0
http://twitter.com/account/rate_limit_status.xml
https://api.twitter.com/oauth/access_token
https://d.symcb.com/rpa0.
http://api.twitter.com/oauth/request_token
http://www.w3.org/2003/05/soap-envelope
http://www.w3.org/
http://www.microsoft.com/pkiops/docs/primarycps.htm0@
http://twitter.com/followers/ids.xml
https://dsc.gg/GilasCabal
http://ts-ocsp.ws.symantec.com0;
http://twitter.com/direct_messages/new.xml
http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl0a
http://ocsp.verisign.com0
http://schemas.xmlsoap.org/ws/2005/05/identity/NoProofKey</wst:KeyType
http://pki-crl.symauth.com/ca_732b6ec148d290c0a071efd1dac8e288/LatestCRL.crl07
http://twitter.com/statuses/show/
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue</wsa:Action
http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd
http://schemas.microsoft.com/LiveID/SoapServices/v1
http://schemas.xmlsoap.org/soap/envelope/
http://api.twitpic.com/1/uploadAndPost.xml
http://twitter.com/account/verify_credentials.xml
http://twitter.com/statuses/user_timeline.xml
http://www.microsoft.com/pkiops/certs/MicCodSigPCA2011_2011-07-08.crt0
http://twitter.com/direct_messages.xml
http://twitter.com/users/show.xml
http://twitter.com/direct_messages/destroy/
http://schemas.xmlsoap.org/ws/2005/02/trust
http://twitter.com/statuses/destroy/
http://schemas.xmlsoap.org/ws/2004/09/policy
http://www.w3.org/2003/05/soap-rpc
http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl0Z
http://twitter.com/blocks/create/
http://www.cabal.co.kr/Helper/

Import functions

PE Exports 1 suspicious

Function Address
fcEXP 0xa0d850