CompPkgSup.dll?ex=670ef1f2&is=670da072&hm=0ef149bf8000f5d08bd27446ab0651cfc3038bd4f627014443f6e0056b60f8df

First submission 2024-10-15 19:54:02

File details

File type: PE32+ executable (DLL) (GUI) x86-64, for MS Windows
Mime type: application/x-dosexec
File size: 336.05 KB (344120 bytes)
Compile time: 2024-10-12 02:55:47
MD5: f0fa6871cb996242a649dd629a0591f1
SHA1: 8e5bedd1dd509f83d13426ff22d62f349488ae5f
SHA256: 40f4d3bbb8009c0ff599f4102b1601467a3bfc18de64061f92eff0f1fc0b3d6e
Import Hash : 3254359579f23afe607e1d61dde58b23
Sections 6 .text .rdata .data .pdata .rsrc .reloc
Directories 6 import resource debug tls relocation security

File features detected

Is DLL
Packers
Anti Debug
Anti VM
Signed
XOR

OSINT Enrichments

Virus Total: 11/77 VT report date: 2024-10-15 10:55:58
Malware Type 1 trojan
Threat Type 1 gencbl

URLs, FQDN and IP indicators 1

URL Host (FQDN/IP) Date Added
hXXps://cdn.discordapp.com/attachments/1275547427826569297/1295519381710962760/CompPkgSup.dll?ex=670ef1f2&is=670da072&hm=0ef149bf8000f5d08bd27446ab0651cfc3038bd4f627014443f6e0056b60f8df VirusTotal Report cdn.discordapp.com VirusTotal Report 2024-10-15 19:54:02

PE Sections 0 suspicious

Name VAddress VSize Size SHA1 MD5 Suspicious
.text 0x1000 0x3effb 258048 a284209a45ee0fb3441f4f1070f82e595d361493 e5b30f03c385e9496cb7f415587d6841
.rdata 0x40000 0xeb5c 60416 608a6a9656bac2fd93134fe48054b04b12cc1153 4a8b8352afec621a3ee78deba453fb28
.data 0x4f000 0x1e08 2560 0d09b4693f6537dc79e04e38c4d9f72ac252f7f4 b4438c0d30de02275d9a4bf4b89e8a6b
.pdata 0x51000 0x2c4c 11776 81aff6a2723b49c8d7268c12b50a04ef062b840a 8c3c2c61aafe2885eb3951d312a8f393
.rsrc 0x54000 0xf8 512 6bbc15a0367b83368d6ac205d6d53848301792ab 7c139771cc4b97d7f468254be5d2679a
.reloc 0x55000 0x148 512 e2c72d2de20e89a94352c9ea9825ab193068aad8 4dc9b1e2cecb0a6d7bf3095fe687757c

PE Resources 1

Name Language Sublanguage Offset Size Data
RT_MANIFEST LANG_ENGLISH SUBLANG_ENGLISH_US 0x54060 145

Anti debug functions 6

GetLastError
IsDebuggerPresent
IsProcessorFeaturePresent
RaiseException
TerminateProcess
UnhandledExceptionFilter

File signature

MD5 SHA1 Block size Virtual Address
77b46abf5ee59e4f7ce17f5a9a09c3bd dc1378de61d0aacaaec629faa496fccc4048713a 9272 334848

Strings analysis - File found

Log
\FortniteGame\Saved\Logs\FortniteGame.log
Text
imgui_log.txt
Library
api-ms-win-core-registry-l1-1-0.dll
DiscordHook64.dll
ADVAPI32.dll
bin\amd64\MSPDB140.DLL
api-ms-win-crt-utility-l1-1-0.dll
api-ms-win-crt-heap-l1-1-0.dll
msvcp140.dll
api-ms-win-crt-stdio-l1-1-0.dll
WS2_32.dll
api-ms-win-crt-string-l1-1-0.dll
api-ms-win-crt-convert-l1-1-0.dll
vcruntime140.dll
api-ms-win-crt-filesystem-l1-1-0.dll
VCRUNTIME140_1.dll
d3dcompiler_47.dll
IMM32.dll
xinput1_4.dll
api-ms-win-crt-runtime-l1-1-0.dll
api-ms-win-crt-math-l1-1-0.dll
api-ms-win-crt-environment-l1-1-0.dll
USER32.dll
KERNEL32.dll

Strings analysis - Possible URLs found 20

https://www.verisign.com/cps0
https://d.symcb.com/cps0%
http://ocsp.digicert.com0C
http://ocsp.verisign.com0
http://ocsp.digicert.com0A
https://www.verisign.com/rpa
http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
http://sf.symcb.com/sf.crl0f
http://crl.verisign.com/pca3-g5.crl04
https://www.verisign.com/rpa0
http://logo.verisign.com/vslogo.gif04
http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
http://sf.symcd.com0&
http://sf.symcb.com/sf.crt0
http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
https://d.symcb.com/rpa0
http://ocsp.digicert.com0X

Import functions

Name Latest seen MD5
win64help.dll?ex=670c3661&is=670ae4e1&hm=34e9d9802f25be6669092bd636fdec89da344d630c1feed0501755a57d63d928& 2024-10-13 18:33:02 3fe8eb38f23d00e1045c26084724785e