Source: 17296647828551b11aca9b151564721554cb3198cad41fe09df6ef699a89a6a1e471ca1e8b529.dat-decoded.exe |
Avira: detected |
Source: 17296647828551b11aca9b151564721554cb3198cad41fe09df6ef699a89a6a1e471ca1e8b529.dat-decoded.exe |
Malware Configuration Extractor: LummaC {"C2 url": ["outpointsozp.shop", "lariatedzugspd.shop", "callosallsaospz.shop", "upknittsoappz.shop", "unseaffarignsk.shop", "qualitypxvoz.shop", "indexterityszcoxp.shop", "liernessfornicsa.shop", "shepherdlyopzc.shop"], "Build id": "RKiJ2s--mondey2"} |
Source: 17296647828551b11aca9b151564721554cb3198cad41fe09df6ef699a89a6a1e471ca1e8b529.dat-decoded.exe |
ReversingLabs: Detection: 23% |
Source: Submited Sample |
Integrated Neural Analysis Model: Matched 95.5% probability |
Source: 17296647828551b11aca9b151564721554cb3198cad41fe09df6ef699a89a6a1e471ca1e8b529.dat-decoded.exe |
String decryptor: indexterityszcoxp.shop |
Source: 17296647828551b11aca9b151564721554cb3198cad41fe09df6ef699a89a6a1e471ca1e8b529.dat-decoded.exe |
String decryptor: lariatedzugspd.shop |
Source: 17296647828551b11aca9b151564721554cb3198cad41fe09df6ef699a89a6a1e471ca1e8b529.dat-decoded.exe |
String decryptor: callosallsaospz.shop |
Source: 17296647828551b11aca9b151564721554cb3198cad41fe09df6ef699a89a6a1e471ca1e8b529.dat-decoded.exe |
String decryptor: outpointsozp.shop |
Source: 17296647828551b11aca9b151564721554cb3198cad41fe09df6ef699a89a6a1e471ca1e8b529.dat-decoded.exe |
String decryptor: liernessfornicsa.shop |
Source: 17296647828551b11aca9b151564721554cb3198cad41fe09df6ef699a89a6a1e471ca1e8b529.dat-decoded.exe |
String decryptor: upknittsoappz.shop |
Source: 17296647828551b11aca9b151564721554cb3198cad41fe09df6ef699a89a6a1e471ca1e8b529.dat-decoded.exe |
String decryptor: shepherdlyopzc.shop |
Source: 17296647828551b11aca9b151564721554cb3198cad41fe09df6ef699a89a6a1e471ca1e8b529.dat-decoded.exe |
String decryptor: unseaffarignsk.shop |
Source: 17296647828551b11aca9b151564721554cb3198cad41fe09df6ef699a89a6a1e471ca1e8b529.dat-decoded.exe |
String decryptor: qualitypxvoz.shop |
Source: 17296647828551b11aca9b151564721554cb3198cad41fe09df6ef699a89a6a1e471ca1e8b529.dat-decoded.exe |
String decryptor: lid=%s&j=%s&ver=4.0 |
Source: 17296647828551b11aca9b151564721554cb3198cad41fe09df6ef699a89a6a1e471ca1e8b529.dat-decoded.exe |
String decryptor: TeslaBrowser/5.5 |
Source: 17296647828551b11aca9b151564721554cb3198cad41fe09df6ef699a89a6a1e471ca1e8b529.dat-decoded.exe |
String decryptor: - Screen Resoluton: |
Source: 17296647828551b11aca9b151564721554cb3198cad41fe09df6ef699a89a6a1e471ca1e8b529.dat-decoded.exe |
String decryptor: - Physical Installed Memory: |
Source: 17296647828551b11aca9b151564721554cb3198cad41fe09df6ef699a89a6a1e471ca1e8b529.dat-decoded.exe |
String decryptor: Workgroup: - |
Source: 17296647828551b11aca9b151564721554cb3198cad41fe09df6ef699a89a6a1e471ca1e8b529.dat-decoded.exe |
String decryptor: RKiJ2s--mondey2 |
Source: 17296647828551b11aca9b151564721554cb3198cad41fe09df6ef699a89a6a1e471ca1e8b529.dat-decoded.exe |
Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: Malware configuration extractor |
URLs: outpointsozp.shop |
Source: Malware configuration extractor |
URLs: lariatedzugspd.shop |
Source: Malware configuration extractor |
URLs: callosallsaospz.shop |
Source: Malware configuration extractor |
URLs: upknittsoappz.shop |
Source: Malware configuration extractor |
URLs: unseaffarignsk.shop |
Source: Malware configuration extractor |
URLs: qualitypxvoz.shop |
Source: Malware configuration extractor |
URLs: indexterityszcoxp.shop |
Source: Malware configuration extractor |
URLs: liernessfornicsa.shop |
Source: Malware configuration extractor |
URLs: shepherdlyopzc.shop |
Source: 17296647828551b11aca9b151564721554cb3198cad41fe09df6ef699a89a6a1e471ca1e8b529.dat-decoded.exe |
Static PE information: section name: `.rdat |
Source: 17296647828551b11aca9b151564721554cb3198cad41fe09df6ef699a89a6a1e471ca1e8b529.dat-decoded.exe |
Static PE information: section name: @.data |
Source: 17296647828551b11aca9b151564721554cb3198cad41fe09df6ef699a89a6a1e471ca1e8b529.dat-decoded.exe |
Static PE information: No import functions for PE file found |
Source: 17296647828551b11aca9b151564721554cb3198cad41fe09df6ef699a89a6a1e471ca1e8b529.dat-decoded.exe |
Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: 17296647828551b11aca9b151564721554cb3198cad41fe09df6ef699a89a6a1e471ca1e8b529.dat-decoded.exe |
Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC size: 0xe8000500 address: 0x0 |
Source: classification engine |
Classification label: mal100.troj.evad.winEXE@0/0@0/0 |
Source: 17296647828551b11aca9b151564721554cb3198cad41fe09df6ef699a89a6a1e471ca1e8b529.dat-decoded.exe |
Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE |
Source: 17296647828551b11aca9b151564721554cb3198cad41fe09df6ef699a89a6a1e471ca1e8b529.dat-decoded.exe |
ReversingLabs: Detection: 23% |
Source: 17296647828551b11aca9b151564721554cb3198cad41fe09df6ef699a89a6a1e471ca1e8b529.dat-decoded.exe |
Static PE information: Virtual size of .text is bigger than: 0x100000 |
Source: 17296647828551b11aca9b151564721554cb3198cad41fe09df6ef699a89a6a1e471ca1e8b529.dat-decoded.exe |
Static PE information: real checksum: 0x4 should be: 0x4f47a |
Source: 17296647828551b11aca9b151564721554cb3198cad41fe09df6ef699a89a6a1e471ca1e8b529.dat-decoded.exe |
Static PE information: section name: `.rdat |
Source: 17296647828551b11aca9b151564721554cb3198cad41fe09df6ef699a89a6a1e471ca1e8b529.dat-decoded.exe |
Static PE information: section name: .relo |
Source: 17296647828551b11aca9b151564721554cb3198cad41fe09df6ef699a89a6a1e471ca1e8b529.dat-decoded.exe |
Static PE information: section name: @.data |
Source: 17296647828551b11aca9b151564721554cb3198cad41fe09df6ef699a89a6a1e471ca1e8b529.dat-decoded.exe |
String found in binary or memory: indexterityszcoxp.shop |
Source: 17296647828551b11aca9b151564721554cb3198cad41fe09df6ef699a89a6a1e471ca1e8b529.dat-decoded.exe |
String found in binary or memory: lariatedzugspd.shop |
Source: 17296647828551b11aca9b151564721554cb3198cad41fe09df6ef699a89a6a1e471ca1e8b529.dat-decoded.exe |
String found in binary or memory: callosallsaospz.shop |
Source: 17296647828551b11aca9b151564721554cb3198cad41fe09df6ef699a89a6a1e471ca1e8b529.dat-decoded.exe |
String found in binary or memory: outpointsozp.shop |
Source: 17296647828551b11aca9b151564721554cb3198cad41fe09df6ef699a89a6a1e471ca1e8b529.dat-decoded.exe |
String found in binary or memory: liernessfornicsa.shop |
Source: 17296647828551b11aca9b151564721554cb3198cad41fe09df6ef699a89a6a1e471ca1e8b529.dat-decoded.exe |
String found in binary or memory: upknittsoappz.shop |
Source: 17296647828551b11aca9b151564721554cb3198cad41fe09df6ef699a89a6a1e471ca1e8b529.dat-decoded.exe |
String found in binary or memory: shepherdlyopzc.shop |
Source: 17296647828551b11aca9b151564721554cb3198cad41fe09df6ef699a89a6a1e471ca1e8b529.dat-decoded.exe |
String found in binary or memory: unseaffarignsk.shop |
Source: 17296647828551b11aca9b151564721554cb3198cad41fe09df6ef699a89a6a1e471ca1e8b529.dat-decoded.exe |
String found in binary or memory: qualitypxvoz.shop |
Source: Yara match |
File source: decrypted.binstr, type: MEMORYSTR |
Source: Yara match |
File source: 17296647828551b11aca9b151564721554cb3198cad41fe09df6ef699a89a6a1e471ca1e8b529.dat-decoded.exe, type: SAMPLE |
Source: Yara match |
File source: decrypted.binstr, type: MEMORYSTR |
Source: Yara match |
File source: 17296647828551b11aca9b151564721554cb3198cad41fe09df6ef699a89a6a1e471ca1e8b529.dat-decoded.exe, type: SAMPLE |