Edit tour
Windows
Analysis Report
Fac.exe
Overview
General Information
Detection
GuLoader, Snake Keylogger
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Yara detected Snake Keylogger
Yara detected Telegram RAT
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Classification
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
CloudEyE, GuLoader | CloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored. | No Attribution |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
404 Keylogger, Snake Keylogger | Snake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram. | No Attribution |
{"Exfil Mode": "Telegram", "Token": "7511877228:AAEfdtsXiYLhmN4YbL4GOCHPaqlvykB-alc", "Chat_id": "7534008929", "Version": "4.4"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_SnakeKeylogger | Yara detected Snake Keylogger | Joe Security | ||
JoeSecurity_GuLoader_2 | Yara detected GuLoader | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security |
⊘No Sigma rule has matched
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-18T14:53:26.948320+0100 | 2803305 | 3 | Unknown Traffic | 192.168.11.20 | 49771 | 104.21.67.152 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-18T14:53:24.895412+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.11.20 | 49769 | 193.122.6.168 | 80 | TCP |
2024-11-18T14:53:26.535622+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.11.20 | 49769 | 193.122.6.168 | 80 | TCP |
2024-11-18T14:53:27.348298+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.11.20 | 49772 | 193.122.6.168 | 80 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-18T14:53:20.138741+0100 | 2803270 | 2 | Potentially Bad Traffic | 192.168.11.20 | 49767 | 142.251.41.14 | 443 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Location Tracking |
---|
Source: | DNS query: |
Source: | Code function: | 2_2_36C3D2A8 | |
Source: | Code function: | 2_2_36C3D9F0 |
Source: | Static PE information: |
Source: | HTTPS traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Code function: | 0_2_004065C7 | |
Source: | Code function: | 0_2_00405996 | |
Source: | Code function: | 0_2_00402868 | |
Source: | Code function: | 2_2_00402868 | |
Source: | Code function: | 2_2_004065C7 | |
Source: | Code function: | 2_2_00405996 |
Source: | Code function: | 2_2_0015F2C0 | |
Source: | Code function: | 2_2_0015F4AC | |
Source: | Code function: | 2_2_0015F52D | |
Source: | Code function: | 2_2_0015F95F | |
Source: | Code function: | 2_2_36C32DC8 | |
Source: | Code function: | 2_2_36C3F8D8 | |
Source: | Code function: | 2_2_36C32968 | |
Source: | Code function: | 2_2_36C3F641 | |
Source: | Code function: | 2_2_36C32DC3 | |
Source: | Code function: | 2_2_36C30B30 | |
Source: | Code function: | 2_2_36C30B30 | |
Source: | Code function: | 2_2_36C30040 | |
Source: | Code function: | 2_2_36C3310E | |
Source: | Code function: | 2_2_36FBA6E8 | |
Source: | Code function: | 2_2_36FB52C8 | |
Source: | Code function: | 2_2_36FBAD40 | |
Source: | Code function: | 2_2_36FB2300 | |
Source: | Code function: | 2_2_36FB15F8 | |
Source: | Code function: | 2_2_36FB8FF8 | |
Source: | Code function: | 2_2_36FBBFF8 | |
Source: | Code function: | 2_2_36FB08F0 | |
Source: | Code function: | 2_2_36FB82F0 | |
Source: | Code function: | 2_2_36FB75E8 | |
Source: | Code function: | 2_2_36FBDFE8 | |
Source: | Code function: | 2_2_36FB99E0 | |
Source: | Code function: | 2_2_36FBB6D8 | |
Source: | Code function: | 2_2_36FB5FD0 | |
Source: | Code function: | 2_2_36FBD6C8 | |
Source: | Code function: | 2_2_36FB45C0 | |
Source: | Code function: | 2_2_36FB38B8 | |
Source: | Code function: | 2_2_36FBF6B8 | |
Source: | Code function: | 2_2_36FB2BB0 | |
Source: | Code function: | 2_2_36FB1EA8 | |
Source: | Code function: | 2_2_36FBCDA8 | |
Source: | Code function: | 2_2_36FB11A0 | |
Source: | Code function: | 2_2_36FB8BA0 | |
Source: | Code function: | 2_2_36FB0498 | |
Source: | Code function: | 2_2_36FB7E98 | |
Source: | Code function: | 2_2_36FBED98 | |
Source: | Code function: | 2_2_36FB7190 | |
Source: | Code function: | 2_2_36FBA290 | |
Source: | Code function: | 2_2_36FB9588 | |
Source: | Code function: | 2_2_36FBC488 | |
Source: | Code function: | 2_2_36FB5B78 | |
Source: | Code function: | 2_2_36FBE478 | |
Source: | Code function: | 2_2_36FB4E70 | |
Source: | Code function: | 2_2_36FB4168 | |
Source: | Code function: | 2_2_36FBBB68 | |
Source: | Code function: | 2_2_36FB3460 | |
Source: | Code function: | 2_2_36FB2758 | |
Source: | Code function: | 2_2_36FBDB58 | |
Source: | Code function: | 2_2_36FB1A50 | |
Source: | Code function: | 2_2_36FB0D48 | |
Source: | Code function: | 2_2_36FB8748 | |
Source: | Code function: | 2_2_36FBB248 | |
Source: | Code function: | 2_2_36FBFB48 | |
Source: | Code function: | 2_2_36FB0040 | |
Source: | Code function: | 2_2_36FB7A40 | |
Source: | Code function: | 2_2_36FB9E38 | |
Source: | Code function: | 2_2_36FBD238 | |
Source: | Code function: | 2_2_36FBF228 | |
Source: | Code function: | 2_2_36FB5720 | |
Source: | Code function: | 2_2_36FB4A18 | |
Source: | Code function: | 2_2_36FBC918 | |
Source: | Code function: | 2_2_36FB3D10 | |
Source: | Code function: | 2_2_36FB3008 | |
Source: | Code function: | 2_2_36FBE908 | |
Source: | Code function: | 2_2_36FE61E8 | |
Source: | Code function: | 2_2_36FE2DA8 | |
Source: | Code function: | 2_2_36FE1FF8 | |
Source: | Code function: | 2_2_36FEB7F8 | |
Source: | Code function: | 2_2_36FE0DF0 | |
Source: | Code function: | 2_2_36FE8CF0 | |
Source: | Code function: | 2_2_36FE3FE8 | |
Source: | Code function: | 2_2_36FEFAE8 | |
Source: | Code function: | 2_2_36FECFE0 | |
Source: | Code function: | 2_2_36FEA4D8 | |
Source: | Code function: | 2_2_36FE04D0 | |
Source: | Code function: | 2_2_36FE79D0 | |
Source: | Code function: | 2_2_36FE36C8 | |
Source: | Code function: | 2_2_36FEE7C8 | |
Source: | Code function: | 2_2_36FEBCC0 | |
Source: | Code function: | 2_2_36FE56B8 | |
Source: | Code function: | 2_2_36FE91B8 | |
Source: | Code function: | 2_2_36FE66B0 | |
Source: | Code function: | 2_2_36FED4A8 | |
Source: | Code function: | 2_2_36FEA9A0 | |
Source: | Code function: | 2_2_36FE4D98 | |
Source: | Code function: | 2_2_36FE7E98 | |
Source: | Code function: | 2_2_36FEEC90 | |
Source: | Code function: | 2_2_36FE2488 | |
Source: | Code function: | 2_2_36FEC188 | |
Source: | Code function: | 2_2_36FE1280 | |
Source: | Code function: | 2_2_36FE9680 | |
Source: | Code function: | 2_2_36FE4478 | |
Source: | Code function: | 2_2_36FE6B78 | |
Source: | Code function: | 2_2_36FED970 | |
Source: | Code function: | 2_2_36FE1B68 | |
Source: | Code function: | 2_2_36FEAE68 | |
Source: | Code function: | 2_2_36FE0960 | |
Source: | Code function: | 2_2_36FE8360 | |
Source: | Code function: | 2_2_36FE3B58 | |
Source: | Code function: | 2_2_36FEF158 | |
Source: | Code function: | 2_2_36FEC650 | |
Source: | Code function: | 2_2_36FE5B48 | |
Source: | Code function: | 2_2_36FE9B48 | |
Source: | Code function: | 2_2_36FE0040 | |
Source: | Code function: | 2_2_36FE7040 | |
Source: | Code function: | 2_2_36FE3238 | |
Source: | Code function: | 2_2_36FEDE38 | |
Source: | Code function: | 2_2_36FEB330 | |
Source: | Code function: | 2_2_36FE5228 | |
Source: | Code function: | 2_2_36FE8828 | |
Source: | Code function: | 2_2_36FEF620 | |
Source: | Code function: | 2_2_36FE2918 | |
Source: | Code function: | 2_2_36FECB18 | |
Source: | Code function: | 2_2_36FE1710 | |
Source: | Code function: | 2_2_36FEA010 | |
Source: | Code function: | 2_2_36FE4908 | |
Source: | Code function: | 2_2_36FE7508 | |
Source: | Code function: | 2_2_36FEE300 | |
Source: | Code function: | 2_2_37001828 | |
Source: | Code function: | 2_2_37000508 | |
Source: | Code function: | 2_2_37001360 | |
Source: | Code function: | 2_2_370009D0 | |
Source: | Code function: | 2_2_37000040 | |
Source: | Code function: | 2_2_37000E98 | |
Source: | Code function: | 2_2_37043E61 | |
Source: | Code function: | 2_2_37043E70 | |
Source: | Code function: | 2_2_37040A00 | |
Source: | Code function: | 2_2_37040A10 |
Networking |
---|
Source: | DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | JA3 fingerprint: | ||
Source: | JA3 fingerprint: | ||
Source: | JA3 fingerprint: |
Source: | DNS query: | ||
Source: | DNS query: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | HTTPS traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: |