Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe |
Avira: detected |
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe |
Malware Configuration Extractor: LummaC {"C2 url": ["radiationnopp.shop", "bouncedgowp.shop", "publicitttyps.shop", "bannngwko.shop", "benchillppwo.shop", "bargainnykwo.shop", "answerrsdo.shop", "affecthorsedpo.shop"], "Build id": "eFtdO8--"} |
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe |
ReversingLabs: Detection: 13% |
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe |
Joe Sandbox ML: detected |
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe |
String decryptor: benchillppwo.shop |
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe |
String decryptor: publicitttyps.shop |
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe |
String decryptor: answerrsdo.shop |
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe |
String decryptor: radiationnopp.shop |
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe |
String decryptor: affecthorsedpo.shop |
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe |
String decryptor: bargainnykwo.shop |
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe |
String decryptor: bannngwko.shop |
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe |
String decryptor: bouncedgowp.shop |
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe |
String decryptor: benchillppwo.shop |
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe |
String decryptor: lid=%s&j=%s&ver=4.0 |
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe |
String decryptor: TeslaBrowser/5.5 |
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe |
String decryptor: - Screen Resoluton: |
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe |
String decryptor: - Physical Installed Memory: |
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe |
String decryptor: Workgroup: - |
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe |
String decryptor: eFtdO8-- |
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe |
Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: Malware configuration extractor |
URLs: radiationnopp.shop |
Source: Malware configuration extractor |
URLs: bouncedgowp.shop |
Source: Malware configuration extractor |
URLs: publicitttyps.shop |
Source: Malware configuration extractor |
URLs: bannngwko.shop |
Source: Malware configuration extractor |
URLs: benchillppwo.shop |
Source: Malware configuration extractor |
URLs: bargainnykwo.shop |
Source: Malware configuration extractor |
URLs: answerrsdo.shop |
Source: Malware configuration extractor |
URLs: affecthorsedpo.shop |
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe |
Static PE information: section name: `.rdat |
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe |
Static PE information: section name: @.data |
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe |
Static PE information: No import functions for PE file found |
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe |
Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe |
Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC size: 0xd0000520 address: 0x0 |
Source: classification engine |
Classification label: mal100.troj.evad.winEXE@0/0@0/0 |
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe |
Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE |
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe |
ReversingLabs: Detection: 13% |
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe |
Static PE information: Virtual size of .text is bigger than: 0x100000 |
Source: initial sample |
Static PE information: section where entry point is pointing to: .relo |
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe |
Static PE information: real checksum: 0x4 should be: 0x5d9a1 |
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe |
Static PE information: section name: `.rdat |
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe |
Static PE information: section name: .relo |
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe |
Static PE information: section name: @.data |
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe |
String found in binary or memory: benchillppwo.shop |
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe |
String found in binary or memory: publicitttyps.shop |
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe |
String found in binary or memory: answerrsdo.shop |
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe |
String found in binary or memory: radiationnopp.shop |
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe |
String found in binary or memory: affecthorsedpo.shop |
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe |
String found in binary or memory: bargainnykwo.shop |
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe |
String found in binary or memory: bannngwko.shop |
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe |
String found in binary or memory: bouncedgowp.shop |
Source: Yara match |
File source: decrypted.binstr, type: MEMORYSTR |
Source: Yara match |
File source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe, type: SAMPLE |
Source: Yara match |
File source: decrypted.binstr, type: MEMORYSTR |
Source: Yara match |
File source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe, type: SAMPLE |