Windows
Analysis Report
furra.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
furra.exe (PID: 1048 cmdline:
"C:\Users\ user\Deskt op\furra.e xe" MD5: 05F42A351356393179165A84086F8C07) LummaC2.exe (PID: 500 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\LummaC 2.exe" MD5: 8DA89B163D506BE4A73B987517A1B9E4) start-this-724.exe (PID: 6968 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\start- this-724.e xe" MD5: C411BEF822305589785B18BD83A3CB89) WerFault.exe (PID: 2864 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 6 968 -s 736 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
CryptBot | A typical infostealer, capable of obtaining credentials for browsers, crypto currency wallets, browser cookies, credit cards, and creates screenshots of the infected system. All stolen data is bundled into a zip-file that is uploaded to the c2. | No Attribution |
{
"C2 url": [
"berserkyfir.click",
"noisycuttej.shop",
"rabidcowse.shop",
"cloudewahsj.shop",
"nearycrepso.shop",
"wholersorie.shop",
"abruptyopsn.shop",
"tirepublicerj.shop",
"framekgirus.shop"
],
"Build id": "MeHdy4--pl14vs02"
}
{
"C2 list": [
".1.1home.twelveff20pn.top",
"ope.twelveff20pn.top",
"a.zdnscloud.comn.top",
"home.twelveff20pn.top",
"indohome.twelveff20pn.top"
]
}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
MALWARE_Win_DLInjector04 | Detects downloader / injector | ditekSHen |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Cryptbot_1 | Yara detected Cryptbot | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
MALWARE_Win_DLInjector04 | Detects downloader / injector | ditekSHen |
|
- • AV Detection
- • Cryptography
- • Compliance
- • Software Vulnerabilities
- • Networking
- • Key, Mouse, Clipboard, Microphone and Screen Capturing
- • System Summary
- • Data Obfuscation
- • Persistence and Installation Behavior
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Anti Debugging
- • HIPS / PFW / Operating System Protection Evasion
- • Language, Device and Operating System Detection
- • Lowering of HIPS / PFW / Operating System Security Settings
- • Stealing of Sensitive Information
- • Remote Access Functionality
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: | ||
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: | ||
Source: | ReversingLabs: |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: |
Networking |
---|
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | HTTP traffic detected: |
Source: | IP Address: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | Code function: |
Source: | Code function: |
Source: | Code function: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: |
Source: | Dropped File: |
Source: | Code function: | ||
Source: | Code function: |
Source: | Process created: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Base64 encoded string: |
Source: | Binary string: |
Source: | Binary or memory string: |
Source: | Classification label: |
Source: | Code function: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | File read: | Jump to behavior |
Source: | Key opened: |
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior |
Source: | ReversingLabs: | ||
Source: | Virustotal: |
Source: | String found in binary or memory: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: |
Source: | Key value queried: |
Source: | File opened: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: |
Malware Analysis System Evasion |
---|
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: | ||
Source: | Memory allocated: |
Source: | Thread delayed: |
Source: | API coverage: |
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: |
Source: | File Volume queried: |
Source: | Thread delayed: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | API call chain: |
Source: | Process information queried: |
Source: | Process queried: | ||
Source: | Process queried: |
Source: | Code function: |
Source: | Memory allocated: |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Process created: | ||
Source: | Process created: |
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: | ||
Source: | Queries volume information: |
Source: | Key value queried: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Stealing of Sensitive Information |
---|
Source: | File source: |
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: |
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 2 Command and Scripting Interpreter | 1 DLL Side-Loading | 11 Process Injection | 1 Masquerading | OS Credential Dumping | 221 Security Software Discovery | Remote Services | 1 Screen Capture | 11 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 PowerShell | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Disable or Modify Tools | LSASS Memory | 1 Process Discovery | Remote Desktop Protocol | 11 Archive Collected Data | 1 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 41 Virtualization/Sandbox Evasion | Security Account Manager | 41 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | 2 Clipboard Data | 2 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 11 Process Injection | NTDS | 1 Remote System Discovery | Distributed Component Object Model | Input Capture | 13 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 11 Deobfuscate/Decode Files or Information | LSA Secrets | 1 File and Directory Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 31 Obfuscated Files or Information | Cached Domain Credentials | 13 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 1 DLL Side-Loading | DCSync | Remote System Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
76% | ReversingLabs | ByteCode-MSIL.Trojan.Jalapeno | ||
76% | Virustotal | Browse | ||
100% | Avira | HEUR/AGEN.1357339 | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Joe Sandbox ML | |||
96% | ReversingLabs | Win32.Trojan.LummaStealer | ||
71% | ReversingLabs | Win32.Trojan.LummaStealer |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
httpbin.org | 3.230.67.98 | true | false | high | |
home.twelveff20pn.top | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown | |
false | high | ||
true |
| unknown | |
false | high | ||
false | high | ||
false | high | ||
false | high | ||
true |
| unknown | |
false | high | ||
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
false | high | ||
false | high | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
3.230.67.98 | httpbin.org | United States | 14618 | AMAZON-AESUS | false |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1610179 |
Start date and time: | 2025-02-08 18:09:21 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 52s |
Hypervisor based Inspection enabled: | false |
Report type: | light |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 11 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | furra.exe |
Detection: | MAL |
Classification: | mal100.troj.evad.winEXE@6/8@14/1 |
EGA Information: |
|
HCA Information: | Failed |
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): dllhost.exe, We rFault.exe, WMIADAP.exe, SIHCl ient.exe, svchost.exe - Excluded IPs from analysis (wh
itelisted): 20.42.65.92, 20.19 0.159.0, 13.107.246.45, 20.109 .210.53 - Excluded domains from analysis
(whitelisted): client.wns.win dows.com, onedsblobprdeus17.ea stus.cloudapp.azure.com, ocsp. digicert.com, login.live.com, otelrules.azureedge.net, slscr .update.microsoft.com, blobcol lector.events.data.trafficmana ger.net, ctldl.windowsupdate.c om, umwatson.events.data.micro soft.com, fe3cr.delivery.mp.mi crosoft.com - Execution Graph export aborted
for target furra.exe, PID 104 8 because it is empty - Execution Graph export aborted
for target start-this-724.exe , PID 6968 because there are n o executed function - Report size getting too big, t
oo many NtOpenKeyEx calls foun d. - Report size getting too big, t
oo many NtQueryValueKey calls found.
Time | Type | Description |
---|---|---|
12:10:14 | API Interceptor | |
12:10:19 | API Interceptor |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.9451726162141048 |
Encrypted: | false |
SSDEEP: | 192:6UNE8c+0BU/UVJj4ZrMso5wzuiF3Z24IO8RP:Hy8clBU/UVJjuzuiF3Y4IO8RP |
MD5: | 71F73FA7891D838EE9C5F2FFAB7F80B0 |
SHA1: | 85BE23930A4DF0101705F716F842ED663BD93D17 |
SHA-256: | C97C083FF87DE321A82567D17FD8EAD370E2CB2DC82F9E518BF0E59BE0D68EE9 |
SHA-512: | 81C5C37EDEE66B87A4A9E6AD58777B0AB1124D8169B78E0A4A4AA7830DD37B6CCED9D6450045B15E2E1814287F787926BF31BCA19674F527C9E504FFCF63615C |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 50566 |
Entropy (8bit): | 2.189166324444524 |
Encrypted: | false |
SSDEEP: | 192:gTL8LYyLPc0pOQdw6g6BrHClfun+2OSGWGkIg8ALuNYqwgtcR1xl6dA34+YwefC:CYcyLPqQ2tungSAkr8YPUcRMAtnj |
MD5: | A466D250D967A4D483E9FC5B9E5F2D18 |
SHA1: | 57D5B9A80D85E1519CCF285701F7DD8952B30271 |
SHA-256: | 1CED8813F70BF6B42484C850D94E51F4B92F3A352D0AF6D031FC5E75F7B5F9D4 |
SHA-512: | FE37C5EBC94D395B59E61F349B3B107CBF13DA6BC84A089CA05CA956B077834839DBF674CE0F2EE75774851915F90D73E511BE430019FDC5B976F397F951AEC3 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8304 |
Entropy (8bit): | 3.6883964093160237 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJ3r6In5he6YEOD6ngmf2bMprp89bUKsfVicm:R6lXJ76I546YEK6ngmf2bnUpfVY |
MD5: | 45C6D444A9733739DD879364162BF846 |
SHA1: | 3F282A72C7B8B88FE36FB7FBD691E815B3270A21 |
SHA-256: | 37FF350EEDC6D83BF5029A6F5DBDDAEBF77BD71C27A5CB3744ACE79B87E436A7 |
SHA-512: | 60DC21337265C93B6AAD44592FB3A11EF8570BDA4DD408A435F46DDC437CE24D7F39D4CE57EC3290AB00B10B53FDE9DD5B1BB66B59798FFF3CFF5F0EF4870544 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4614 |
Entropy (8bit): | 4.459152857574298 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zs0Jg77aI9KlWpW8VYCYm8M4JxIA5FK+q8Yh1PA3YLdd:uIjfyI74U7VWJxIhhjPA3YLdd |
MD5: | D69BD8918973F42C6006F5DD959DA293 |
SHA1: | FC3230055BC9C22FBA337F636459EBC5EBFC95C3 |
SHA-256: | 41F7DD7F39CBFFB209E73DE57435EC2DDAB268BB0DB94B715AFA34054E142938 |
SHA-512: | 9D0F51B7011DEF25DA4F73CC8FF5C5B7899A10CD854E41FB3B8EAE2A2B6BB394E0ECB97F02C37FF8BECF7D58E24789DC17BD0EDBA6EFA8C82448F19B67DD2E3D |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\furra.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 425 |
Entropy (8bit): | 5.353683843266035 |
Encrypted: | false |
SSDEEP: | 12:Q3La/KDLI4MWuPTAOKbbDLI4MWuPJKAVKhav:ML9E4KlKDE4KhKiKhk |
MD5: | 859802284B12C59DDBB85B0AC64C08F0 |
SHA1: | 4FDDEFC6DB9645057FEB3322BE98EF10D6A593EE |
SHA-256: | FB234B6DAB715ADABB23E450DADCDBCDDFF78A054BAF19B5CE7A9B4206B7492B |
SHA-512: | 8A371F671B962AE8AE0F58421A13E80F645FF0A9888462C1529B77289098A0EA4D6A9E2E07ABD4F96460FCC32AA87B0581CA4D747E77E69C3620BF1368BA9A67 |
Malicious: | true |
Reputation: | high, very likely benign file |
Preview: |
Process: | C:\Users\user\Desktop\furra.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 328192 |
Entropy (8bit): | 6.7838215637977495 |
Encrypted: | false |
SSDEEP: | 6144:a3VUD8LkbASEQJYMm+l0s0UddmR6ZPcF3tVOTjoBwS0vEA:auDYkbAtQJ30udEyPq3iTjo2Lr |
MD5: | 8DA89B163D506BE4A73B987517A1B9E4 |
SHA1: | 2E110CF5160C511FA3D5843E890B8E9316754F34 |
SHA-256: | EA56E7F640355598346FA0B356699298314E25D809F3AA7CFCE1804A3D1964E5 |
SHA-512: | A85969BCDA0B31CAF0CEC79F45BEC068A498C7AC190FE17D7B7C03F88F5C91F5F6221FCC4FCB46604695D5B95E9047DFC1D2CF31207540C23E929FCCA08D14F5 |
Malicious: | true |
Antivirus: |
|
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\furra.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8059016 |
Entropy (8bit): | 5.8486070310145415 |
Encrypted: | false |
SSDEEP: | 49152:Bm1ddnDl/UOLUhzPvta13s564P0RmwcMsWLMUVIz1pPRif8QWchshbioKxbMhPyJ:Bm9DEzPIsA4ycTWIUuzXv1KMyz8+ |
MD5: | C411BEF822305589785B18BD83A3CB89 |
SHA1: | 890B2BDD6E88A45192D3552879AFBED9955E9B8C |
SHA-256: | B60B783764D2C193EEC80661E43A512FAD2FFC56A56EE1A190B6AAC0CAD33B8E |
SHA-512: | B2503B11B0FFC28118C45490B6C7C148EA034D3FA82805FE4AA3F986DDD9C473DD1CC323AFA19CEA39319F75DEC5BF6E39BDC97FED4D9F4C7CEF48A55363D1A6 |
Malicious: | true |
Antivirus: |
|
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.468659351931986 |
Encrypted: | false |
SSDEEP: | 6144:1zZfpi6ceLPx9skLmb0fdZWSP3aJG8nAgeiJRMMhA2zX4WABluuN9jDH5S:NZHtdZWOKnMM6bFpXj4 |
MD5: | B86AD4447ABA04A25492988C760B9A66 |
SHA1: | BA20D5AD0B1203211EF077A10B7DA2C3D74A3B85 |
SHA-256: | A49964D33478C22B8F3B5D24E9CA4EAF17E71CF8B4362057320140932C082D92 |
SHA-512: | A5C1162A5A2358461FF8BE5F98D24CBECB7A7F3834CB4B4BBA6CD28056AEF0F3E4192CD52B6AE444A7E3EC93E36E885D9B9DF674155B385E530BC8930920E61E |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 6.913779677924732 |
TrID: |
|
File name: | furra.exe |
File size: | 8'397'824 bytes |
MD5: | 05f42a351356393179165a84086f8c07 |
SHA1: | 71093fd05686d6202bf4144f94920deefe551f96 |
SHA256: | 2959ff0bf986bddeb56abf2f54d30ecdc8a645311bba6c674f0aedaaa7594912 |
SHA512: | b6fe9334bbd7dcd55f9b997e502839dd8c26d058ada49a3b804d7e41ee335abb2ab4e5ab0974da5fed3532a0beb8ca9e57b1cb5e416a94803a52a5f4ba9d4c08 |
SSDEEP: | 98304:s4IeiLEkjp/ABP9X6OmtVtNjgpiM+txC1xcTP8cY1JusPWBGu7oBCN7c4J+Rt+x9:s4tCpwJcY1JufL7oBH2IQxLLiU6 |
TLSH: | C086592D63326C9AF3D20764D564B5A597240B2A7C27CFF58A93056D8D20E39D0B83BF |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....s.g.............................8... ...@....@.. ....................................@................................ |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0xc038ee |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x678973C2 [Thu Jan 16 21:01:54 2025 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x803894 | 0x57 | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x804000 | 0x4d8 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x806000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0x8018f4 | 0x801a00 | 6abe53f1352924e414c30c6a219633d5 | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0x804000 | 0x4d8 | 0x600 | 067076876ab129a192c55e8517284108 | False | 0.3743489583333333 | data | 3.7174563596210497 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x806000 | 0xc | 0x200 | 479d8ba52c1674b22eed7a9b6b0407ad | False | 0.044921875 | MacBinary, Mon Feb 6 07:28:16 2040 INVALID date, modified Mon Feb 6 07:28:16 2040 "\200" | 0.10191042566270775 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0x8040a0 | 0x244 | data | 0.4706896551724138 | ||
RT_MANIFEST | 0x8042e8 | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.5469387755102041 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Description | Data |
---|---|
Translation | 0x0000 0x04b0 |
FileDescription | |
FileVersion | 1.0.0.0 |
InternalName | fulfil.exe |
LegalCopyright | |
OriginalFilename | fulfil.exe |
ProductVersion | 1.0.0.0 |
Assembly Version | 1.0.0.0 |
- Total Packets: 25
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Feb 8, 2025 18:10:12.894427061 CET | 49709 | 443 | 192.168.2.6 | 3.230.67.98 |
Feb 8, 2025 18:10:12.894474030 CET | 443 | 49709 | 3.230.67.98 | 192.168.2.6 |
Feb 8, 2025 18:10:12.894536018 CET | 49709 | 443 | 192.168.2.6 | 3.230.67.98 |
Feb 8, 2025 18:10:12.897497892 CET | 49709 | 443 | 192.168.2.6 | 3.230.67.98 |
Feb 8, 2025 18:10:12.897511959 CET | 443 | 49709 | 3.230.67.98 | 192.168.2.6 |
Feb 8, 2025 18:10:13.589061022 CET | 443 | 49709 | 3.230.67.98 | 192.168.2.6 |
Feb 8, 2025 18:10:13.642899990 CET | 49709 | 443 | 192.168.2.6 | 3.230.67.98 |
Feb 8, 2025 18:10:13.645565987 CET | 49709 | 443 | 192.168.2.6 | 3.230.67.98 |
Feb 8, 2025 18:10:13.645574093 CET | 443 | 49709 | 3.230.67.98 | 192.168.2.6 |
Feb 8, 2025 18:10:13.647274017 CET | 443 | 49709 | 3.230.67.98 | 192.168.2.6 |
Feb 8, 2025 18:10:13.647289991 CET | 443 | 49709 | 3.230.67.98 | 192.168.2.6 |
Feb 8, 2025 18:10:13.647345066 CET | 49709 | 443 | 192.168.2.6 | 3.230.67.98 |
Feb 8, 2025 18:10:13.649821997 CET | 49709 | 443 | 192.168.2.6 | 3.230.67.98 |
Feb 8, 2025 18:10:13.649903059 CET | 443 | 49709 | 3.230.67.98 | 192.168.2.6 |
Feb 8, 2025 18:10:13.664679050 CET | 49709 | 443 | 192.168.2.6 | 3.230.67.98 |
Feb 8, 2025 18:10:13.664697886 CET | 443 | 49709 | 3.230.67.98 | 192.168.2.6 |
Feb 8, 2025 18:10:13.705399036 CET | 49709 | 443 | 192.168.2.6 | 3.230.67.98 |
Feb 8, 2025 18:10:13.769620895 CET | 443 | 49709 | 3.230.67.98 | 192.168.2.6 |
Feb 8, 2025 18:10:13.769721031 CET | 443 | 49709 | 3.230.67.98 | 192.168.2.6 |
Feb 8, 2025 18:10:13.769798994 CET | 49709 | 443 | 192.168.2.6 | 3.230.67.98 |
Feb 8, 2025 18:10:13.782196999 CET | 49709 | 443 | 192.168.2.6 | 3.230.67.98 |
Feb 8, 2025 18:10:13.782217026 CET | 443 | 49709 | 3.230.67.98 | 192.168.2.6 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Feb 8, 2025 18:10:12.875533104 CET | 52447 | 53 | 192.168.2.6 | 1.1.1.1 |
Feb 8, 2025 18:10:12.875756025 CET | 52447 | 53 | 192.168.2.6 | 1.1.1.1 |
Feb 8, 2025 18:10:12.882889986 CET | 53 | 52447 | 1.1.1.1 | 192.168.2.6 |
Feb 8, 2025 18:10:12.893241882 CET | 53 | 52447 | 1.1.1.1 | 192.168.2.6 |
Feb 8, 2025 18:10:14.965868950 CET | 52450 | 53 | 192.168.2.6 | 1.1.1.1 |
Feb 8, 2025 18:10:14.965903997 CET | 52450 | 53 | 192.168.2.6 | 1.1.1.1 |
Feb 8, 2025 18:10:14.976577044 CET | 53 | 52450 | 1.1.1.1 | 192.168.2.6 |
Feb 8, 2025 18:10:15.114005089 CET | 53 | 52450 | 1.1.1.1 | 192.168.2.6 |
Feb 8, 2025 18:10:15.255815983 CET | 52451 | 53 | 192.168.2.6 | 1.1.1.1 |
Feb 8, 2025 18:10:15.255871058 CET | 52451 | 53 | 192.168.2.6 | 1.1.1.1 |
Feb 8, 2025 18:10:15.265638113 CET | 53 | 52451 | 1.1.1.1 | 192.168.2.6 |
Feb 8, 2025 18:10:15.265918970 CET | 53 | 52451 | 1.1.1.1 | 192.168.2.6 |
Feb 8, 2025 18:10:15.383496046 CET | 52452 | 53 | 192.168.2.6 | 1.1.1.1 |
Feb 8, 2025 18:10:15.383543015 CET | 52452 | 53 | 192.168.2.6 | 1.1.1.1 |
Feb 8, 2025 18:10:15.392632961 CET | 53 | 52452 | 1.1.1.1 | 192.168.2.6 |
Feb 8, 2025 18:10:15.392661095 CET | 53 | 52452 | 1.1.1.1 | 192.168.2.6 |
Feb 8, 2025 18:10:15.508399010 CET | 51524 | 53 | 192.168.2.6 | 1.1.1.1 |
Feb 8, 2025 18:10:15.508480072 CET | 51524 | 53 | 192.168.2.6 | 1.1.1.1 |
Feb 8, 2025 18:10:15.691864967 CET | 53 | 51524 | 1.1.1.1 | 192.168.2.6 |
Feb 8, 2025 18:10:15.692231894 CET | 53 | 51524 | 1.1.1.1 | 192.168.2.6 |
Feb 8, 2025 18:10:15.805768013 CET | 51525 | 53 | 192.168.2.6 | 1.1.1.1 |
Feb 8, 2025 18:10:15.805818081 CET | 51525 | 53 | 192.168.2.6 | 1.1.1.1 |
Feb 8, 2025 18:10:15.815924883 CET | 53 | 51525 | 1.1.1.1 | 192.168.2.6 |
Feb 8, 2025 18:10:15.946170092 CET | 53 | 51525 | 1.1.1.1 | 192.168.2.6 |
Feb 8, 2025 18:10:16.055516958 CET | 51526 | 53 | 192.168.2.6 | 1.1.1.1 |
Feb 8, 2025 18:10:16.055592060 CET | 51526 | 53 | 192.168.2.6 | 1.1.1.1 |
Feb 8, 2025 18:10:16.231532097 CET | 53 | 51526 | 1.1.1.1 | 192.168.2.6 |
Feb 8, 2025 18:10:16.231538057 CET | 53 | 51526 | 1.1.1.1 | 192.168.2.6 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Feb 8, 2025 18:10:12.875533104 CET | 192.168.2.6 | 1.1.1.1 | 0x7a45 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Feb 8, 2025 18:10:12.875756025 CET | 192.168.2.6 | 1.1.1.1 | 0xca51 | Standard query (0) | 28 | IN (0x0001) | false | |
Feb 8, 2025 18:10:14.965868950 CET | 192.168.2.6 | 1.1.1.1 | 0x638a | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Feb 8, 2025 18:10:14.965903997 CET | 192.168.2.6 | 1.1.1.1 | 0xe378 | Standard query (0) | 28 | IN (0x0001) | false | |
Feb 8, 2025 18:10:15.255815983 CET | 192.168.2.6 | 1.1.1.1 | 0xa529 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Feb 8, 2025 18:10:15.255871058 CET | 192.168.2.6 | 1.1.1.1 | 0x2dde | Standard query (0) | 28 | IN (0x0001) | false | |
Feb 8, 2025 18:10:15.383496046 CET | 192.168.2.6 | 1.1.1.1 | 0xd1c7 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Feb 8, 2025 18:10:15.383543015 CET | 192.168.2.6 | 1.1.1.1 | 0x2ce2 | Standard query (0) | 28 | IN (0x0001) | false | |
Feb 8, 2025 18:10:15.508399010 CET | 192.168.2.6 | 1.1.1.1 | 0xa8cd | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Feb 8, 2025 18:10:15.508480072 CET | 192.168.2.6 | 1.1.1.1 | 0x1a33 | Standard query (0) | 28 | IN (0x0001) | false | |
Feb 8, 2025 18:10:15.805768013 CET | 192.168.2.6 | 1.1.1.1 | 0xb753 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Feb 8, 2025 18:10:15.805818081 CET | 192.168.2.6 | 1.1.1.1 | 0xff24 | Standard query (0) | 28 | IN (0x0001) | false | |
Feb 8, 2025 18:10:16.055516958 CET | 192.168.2.6 | 1.1.1.1 | 0xd541 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Feb 8, 2025 18:10:16.055592060 CET | 192.168.2.6 | 1.1.1.1 | 0xdd94 | Standard query (0) | 28 | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Feb 8, 2025 18:10:12.893241882 CET | 1.1.1.1 | 192.168.2.6 | 0x7a45 | No error (0) | 3.230.67.98 | A (IP address) | IN (0x0001) | false | ||
Feb 8, 2025 18:10:12.893241882 CET | 1.1.1.1 | 192.168.2.6 | 0x7a45 | No error (0) | 3.211.25.71 | A (IP address) | IN (0x0001) | false | ||
Feb 8, 2025 18:10:14.976577044 CET | 1.1.1.1 | 192.168.2.6 | 0x638a | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Feb 8, 2025 18:10:15.114005089 CET | 1.1.1.1 | 192.168.2.6 | 0xe378 | Name error (3) | none | none | 28 | IN (0x0001) | false | |
Feb 8, 2025 18:10:15.265638113 CET | 1.1.1.1 | 192.168.2.6 | 0xa529 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Feb 8, 2025 18:10:15.265918970 CET | 1.1.1.1 | 192.168.2.6 | 0x2dde | Name error (3) | none | none | 28 | IN (0x0001) | false | |
Feb 8, 2025 18:10:15.392632961 CET | 1.1.1.1 | 192.168.2.6 | 0xd1c7 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Feb 8, 2025 18:10:15.392661095 CET | 1.1.1.1 | 192.168.2.6 | 0x2ce2 | Name error (3) | none | none | 28 | IN (0x0001) | false | |
Feb 8, 2025 18:10:15.691864967 CET | 1.1.1.1 | 192.168.2.6 | 0x1a33 | Name error (3) | none | none | 28 | IN (0x0001) | false | |
Feb 8, 2025 18:10:15.692231894 CET | 1.1.1.1 | 192.168.2.6 | 0xa8cd | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Feb 8, 2025 18:10:15.815924883 CET | 1.1.1.1 | 192.168.2.6 | 0xb753 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Feb 8, 2025 18:10:15.946170092 CET | 1.1.1.1 | 192.168.2.6 | 0xff24 | Name error (3) | none | none | 28 | IN (0x0001) | false | |
Feb 8, 2025 18:10:16.231532097 CET | 1.1.1.1 | 192.168.2.6 | 0xd541 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Feb 8, 2025 18:10:16.231538057 CET | 1.1.1.1 | 192.168.2.6 | 0xdd94 | Name error (3) | none | none | 28 | IN (0x0001) | false |
|
Click to jump to process
Target ID: | 0 |
Start time: | 12:10:11 |
Start date: | 08/02/2025 |
Path: | C:\Users\user\Desktop\furra.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x910000 |
File size: | 8'397'824 bytes |
MD5 hash: | 05F42A351356393179165A84086F8C07 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 2 |
Start time: | 12:10:11 |
Start date: | 08/02/2025 |
Path: | C:\Users\user\AppData\Local\Temp\LummaC2.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xa30000 |
File size: | 328'192 bytes |
MD5 hash: | 8DA89B163D506BE4A73B987517A1B9E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Antivirus matches: |
|
Reputation: | low |
Has exited: | false |
Target ID: | 3 |
Start time: | 12:10:12 |
Start date: | 08/02/2025 |
Path: | C:\Users\user\AppData\Local\Temp\start-this-724.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x3c0000 |
File size: | 8'059'016 bytes |
MD5 hash: | C411BEF822305589785B18BD83A3CB89 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Antivirus matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 6 |
Start time: | 12:10:16 |
Start date: | 08/02/2025 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xf00000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |