Windows
Analysis Report
stage6.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
stage6.exe (PID: 6272 cmdline:
"C:\Users\ user\Deskt op\stage6. exe" MD5: 03BE1EE0944764446CD61BE6AE8CC497) stage6.exe (PID: 6536 cmdline:
"C:\Users\ user\Deskt op\stage6. exe" MD5: 03BE1EE0944764446CD61BE6AE8CC497)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
zgRAT | zgRAT is a Remote Access Trojan malware which sometimes drops other malware such as AgentTesla malware. zgRAT has an inforstealer use which targets browser information and cryptowallets.Usually spreads by USB or phishing emails with -zip/-lnk/.bat/.xlsx attachments and so on. | No Attribution |
{
"C2 url": [
"crosshuaht.lat",
"rapeflowwj.lat",
"aspecteirs.lat",
"surmisehotte.click",
"discokeyus.lat",
"energyaffai.lat",
"sustainskelet.lat",
"necklacebudi.lat",
"grannyejh.lat"
],
"Build id": "yJEcaG--singl6"
}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_zgRAT_1 | Yara detected zgRAT | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_AntiVM_3 | Yara detected AntiVM_3 | Joe Security | ||
Click to see the 1 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_zgRAT_1 | Yara detected zgRAT | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-04-27T05:33:12.042328+0200 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49713 | 104.21.32.1 | 443 | TCP |
2025-04-27T05:33:33.426687+0200 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49722 | 23.52.218.12 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-04-27T05:33:31.658514+0200 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49713 | 104.21.32.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-04-27T05:33:31.658514+0200 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.4 | 49713 | 104.21.32.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-04-27T05:33:32.325443+0200 | 2058354 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 57042 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-04-27T05:33:32.653417+0200 | 2058358 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 55368 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-04-27T05:33:31.839059+0200 | 2058360 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 53817 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-04-27T05:33:32.159469+0200 | 2058362 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 60567 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-04-27T05:33:31.666749+0200 | 2058364 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 62128 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-04-27T05:33:31.997019+0200 | 2058370 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 63267 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-04-27T05:33:32.822532+0200 | 2058374 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 58847 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-04-27T05:33:32.490041+0200 | 2058376 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 64227 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-04-27T05:33:33.824801+0200 | 2858666 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49722 | 23.52.218.12 | 443 | TCP |
- • AV Detection
- • Compliance
- • Software Vulnerabilities
- • Networking
- • Key, Mouse, Clipboard, Microphone and Screen Capturing
- • System Summary
- • Data Obfuscation
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Anti Debugging
- • HIPS / PFW / Operating System Protection Evasion
- • Language, Device and Operating System Detection
- • Stealing of Sensitive Information
- • Remote Access Functionality
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Neural Call Log Analysis: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 1_2_0043C767 | |
Source: | Code function: | 1_2_0040B70C | |
Source: | Code function: | 1_2_0042984F | |
Source: | Code function: | 1_2_00423860 | |
Source: | Code function: | 1_2_00438810 | |
Source: | Code function: | 1_2_00438810 | |
Source: | Code function: | 1_2_00438810 | |
Source: | Code function: | 1_2_00438810 | |
Source: | Code function: | 1_2_0041682D | |
Source: | Code function: | 1_2_0041682D | |
Source: | Code function: | 1_2_0041682D | |
Source: | Code function: | 1_2_0041D83A | |
Source: | Code function: | 1_2_00423086 | |
Source: | Code function: | 1_2_00423086 | |
Source: | Code function: | 1_2_0042B170 | |
Source: | Code function: | 1_2_004179C1 | |
Source: | Code function: | 1_2_0043B1D0 | |
Source: | Code function: | 1_2_0043B1D0 | |
Source: | Code function: | 1_2_004291DD | |
Source: | Code function: | 1_2_004291DD | |
Source: | Code function: | 1_2_00405990 | |
Source: | Code function: | 1_2_00405990 | |
Source: | Code function: | 1_2_00422190 | |
Source: | Code function: | 1_2_00422190 | |
Source: | Code function: | 1_2_00422190 | |
Source: | Code function: | 1_2_0042CA49 | |
Source: | Code function: | 1_2_0042DA53 | |
Source: | Code function: | 1_2_00416263 | |
Source: | Code function: | 1_2_00415220 | |
Source: | Code function: | 1_2_00427AD3 | |
Source: | Code function: | 1_2_0042CAD0 | |
Source: | Code function: | 1_2_0041B2E0 | |
Source: | Code function: | 1_2_0043CA93 | |
Source: | Code function: | 1_2_0041CB40 | |
Source: | Code function: | 1_2_0041CB40 | |
Source: | Code function: | 1_2_00428B61 | |
Source: | Code function: | 1_2_0042CB11 | |
Source: | Code function: | 1_2_0042CB22 | |
Source: | Code function: | 1_2_0043F330 | |
Source: | Code function: | 1_2_0040DBD9 | |
Source: | Code function: | 1_2_0040DBD9 | |
Source: | Code function: | 1_2_00417380 | |
Source: | Code function: | 1_2_0041D380 | |
Source: | Code function: | 1_2_00426B95 | |
Source: | Code function: | 1_2_00435450 | |
Source: | Code function: | 1_2_00417380 | |
Source: | Code function: | 1_2_00429C2B | |
Source: | Code function: | 1_2_004291DD | |
Source: | Code function: | 1_2_004291DD | |
Source: | Code function: | 1_2_004074F0 | |
Source: | Code function: | 1_2_004074F0 | |
Source: | Code function: | 1_2_0043ECA0 | |
Source: | Code function: | 1_2_004385E0 | |
Source: | Code function: | 1_2_004385E0 | |
Source: | Code function: | 1_2_00417DEE | |
Source: | Code function: | 1_2_00409580 | |
Source: | Code function: | 1_2_00409580 | |
Source: | Code function: | 1_2_00418591 | |
Source: | Code function: | 1_2_00428D93 | |
Source: | Code function: | 1_2_0041759F | |
Source: | Code function: | 1_2_0041C653 | |
Source: | Code function: | 1_2_00425E70 | |
Source: | Code function: | 1_2_00425E30 | |
Source: | Code function: | 1_2_0043AEC0 | |
Source: | Code function: | 1_2_00408F50 | |
Source: | Code function: | 1_2_00408F50 | |
Source: | Code function: | 1_2_0042A700 | |
Source: | Code function: | 1_2_0041BF14 | |
Source: | Code function: | 1_2_00419F30 | |
Source: | Code function: | 1_2_0041E7C0 | |
Source: | Code function: | 1_2_004197C2 | |
Source: | Code function: | 1_2_004197C2 | |
Source: | Code function: | 1_2_004197C2 | |
Source: | Code function: | 1_2_0042DFE9 | |
Source: | Code function: | 1_2_0040BFFD | |
Source: | Code function: | 1_2_00415799 | |
Source: | Code function: | 1_2_00415799 | |
Source: | Code function: | 1_2_0043EFB0 |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 1_2_004329C0 |
Source: | Code function: | 1_2_004329C0 |
Source: | Code function: | 0_2_0670EA48 | |
Source: | Code function: | 0_2_0670DF90 | |
Source: | Code function: | 0_2_066F0040 | |
Source: | Code function: | 0_2_066F0006 | |
Source: | Code function: | 1_2_00408850 | |
Source: | Code function: | 1_2_0040ACF0 | |
Source: | Code function: | 1_2_00423860 | |
Source: | Code function: | 1_2_00438810 | |
Source: | Code function: | 1_2_0041682D | |
Source: | Code function: | 1_2_004288CB | |
Source: | Code function: | 1_2_0043D880 | |
Source: | Code function: | 1_2_004218A0 | |
Source: | Code function: | 1_2_00430940 | |
Source: | Code function: | 1_2_00403970 | |
Source: | Code function: | 1_2_00420939 | |
Source: | Code function: | 1_2_004179C1 | |
Source: | Code function: | 1_2_004231C2 | |
Source: | Code function: | 1_2_004241C0 | |
Source: | Code function: | 1_2_0043B1D0 | |
Source: | Code function: | 1_2_004291DD | |
Source: | Code function: | 1_2_0043D980 | |
Source: | Code function: | 1_2_00405990 | |
Source: | Code function: | 1_2_00422190 | |
Source: | Code function: | 1_2_0043D997 | |
Source: | Code function: | 1_2_0043D999 | |
Source: | Code function: | 1_2_004091B0 | |
Source: | Code function: | 1_2_0042CA49 | |
Source: | Code function: | 1_2_0042DA53 | |
Source: | Code function: | 1_2_00416263 | |
Source: | Code function: | 1_2_0040EA10 | |
Source: | Code function: | 1_2_00415220 | |
Source: | Code function: | 1_2_0042CAD0 | |
Source: | Code function: | 1_2_004252DD | |
Source: | Code function: | 1_2_0041B2E0 | |
Source: | Code function: | 1_2_00406280 | |
Source: | Code function: | 1_2_0043DA80 | |
Source: | Code function: | 1_2_0041E290 | |
Source: | Code function: | 1_2_0041CB40 | |
Source: | Code function: | 1_2_0043D34D | |
Source: | Code function: | 1_2_00426B50 | |
Source: | Code function: | 1_2_0043DB60 | |
Source: | Code function: | 1_2_00436B08 | |
Source: | Code function: | 1_2_0042830D | |
Source: | Code function: | 1_2_0042CB11 | |
Source: | Code function: | 1_2_00404320 | |
Source: | Code function: | 1_2_0042CB22 | |
Source: | Code function: | 1_2_00425327 | |
Source: | Code function: | 1_2_00408330 | |
Source: | Code function: | 1_2_0043F330 | |
Source: | Code function: | 1_2_0042A33F | |
Source: | Code function: | 1_2_0040DBD9 | |
Source: | Code function: | 1_2_00424380 | |
Source: | Code function: | 1_2_0041FC75 | |
Source: | Code function: | 1_2_0041DC00 | |
Source: | Code function: | 1_2_00429C2B | |
Source: | Code function: | 1_2_004291DD | |
Source: | Code function: | 1_2_004074F0 | |
Source: | Code function: | 1_2_0041148F | |
Source: | Code function: | 1_2_0042AC90 | |
Source: | Code function: | 1_2_0043ECA0 | |
Source: | Code function: | 1_2_0040CD46 | |
Source: | Code function: | 1_2_00437500 | |
Source: | Code function: | 1_2_00422510 | |
Source: | Code function: | 1_2_00417DEE | |
Source: | Code function: | 1_2_00437DF0 | |
Source: | Code function: | 1_2_00409580 | |
Source: | Code function: | 1_2_0041759F | |
Source: | Code function: | 1_2_00425E70 | |
Source: | Code function: | 1_2_00436E74 | |
Source: | Code function: | 1_2_00427603 | |
Source: | Code function: | 1_2_00425E30 | |
Source: | Code function: | 1_2_004286C0 | |
Source: | Code function: | 1_2_0043AEC0 | |
Source: | Code function: | 1_2_004266D0 | |
Source: | Code function: | 1_2_004236E2 | |
Source: | Code function: | 1_2_00405EE0 | |
Source: | Code function: | 1_2_0041DE80 | |
Source: | Code function: | 1_2_00402F50 | |
Source: | Code function: | 1_2_00420F50 | |
Source: | Code function: | 1_2_00438F59 | |
Source: | Code function: | 1_2_00406710 | |
Source: | Code function: | 1_2_00423F20 | |
Source: | Code function: | 1_2_0043F720 | |
Source: | Code function: | 1_2_00419F30 | |
Source: | Code function: | 1_2_0041E7C0 | |
Source: | Code function: | 1_2_004197C2 | |
Source: | Code function: | 1_2_0042DFE9 | |
Source: | Code function: | 1_2_0040A780 | |
Source: | Code function: | 1_2_00411F90 | |
Source: | Code function: | 1_2_00418792 | |
Source: | Code function: | 1_2_00415799 | |
Source: | Code function: | 1_2_0043EFB0 |
Source: | Code function: | ||
Source: | Code function: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: |
Source: | Task registration methods: | ||
Source: | Task registration methods: | ||
Source: | Task registration methods: | ||
Source: | Task registration methods: |
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: |
Source: | Classification label: |
Source: | Code function: | 1_2_00430C70 |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Data Obfuscation |
---|
Source: | .Net Code: |
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Code function: | 0_2_016B0F7B | |
Source: | Code function: | 0_2_066F58F7 | |
Source: | Code function: | 0_2_066F35EC | |
Source: | Code function: | 1_2_0043D812 | |
Source: | Code function: | 1_2_0044346C | |
Source: | Code function: | 1_2_004436B1 | |
Source: | Code function: | 1_2_0043AE3E | |
Source: | Code function: | 1_2_004477AA |
Source: | Static PE information: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | File source: |
Source: | Binary or memory string: |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 1_2_0043C1F0 |
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 1 Scheduled Task/Job | 1 Scheduled Task/Job | 11 Process Injection | 2 Virtualization/Sandbox Evasion | OS Credential Dumping | 11 Security Software Discovery | Remote Services | 11 Archive Collected Data | 11 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 PowerShell | 1 DLL Side-Loading | 1 Scheduled Task/Job | 1 Disable or Modify Tools | LSASS Memory | 2 Virtualization/Sandbox Evasion | Remote Desktop Protocol | 2 Clipboard Data | 1 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 1 DLL Side-Loading | 11 Process Injection | Security Account Manager | 1 Process Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 3 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 111 Deobfuscate/Decode Files or Information | NTDS | 12 System Information Discovery | Distributed Component Object Model | Input Capture | 114 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 4 Obfuscated Files or Information | LSA Secrets | Internet Connection Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 22 Software Packing | Cached Domain Credentials | Wi-Fi Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 1 DLL Side-Loading | DCSync | Remote System Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
59% | Virustotal | Browse | ||
64% | ReversingLabs | Win32.Trojan.Leonem | ||
100% | Avira | HEUR/AGEN.1323360 | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
surmisehotte.click | 104.21.32.1 | true | true | unknown | |
steamcommunity.com | 23.52.218.12 | true | false | high | |
sustainskelet.lat | unknown | unknown | true | unknown | |
crosshuaht.lat | unknown | unknown | true | unknown | |
rapeflowwj.lat | unknown | unknown | true | unknown | |
grannyejh.lat | unknown | unknown | true | unknown | |
aspecteirs.lat | unknown | unknown | true | unknown | |
discokeyus.lat | unknown | unknown | true | unknown | |
energyaffai.lat | unknown | unknown | true | unknown | |
necklacebudi.lat | unknown | unknown | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.21.32.1 | surmisehotte.click | United States | 13335 | CLOUDFLARENETUS | true | |
23.52.218.12 | steamcommunity.com | United States | 27747 | TelecentroSAAR | false |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1675329 |
Start date and time: | 2025-04-27 05:32:15 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 42s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 12 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | stage6.exe |
Detection: | MAL |
Classification: | mal100.troj.evad.winEXE@3/0@10/2 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): MpCmdRun.exe, s ppsvc.exe, SIHClient.exe, Sgrm Broker.exe, conhost.exe, svcho st.exe - Excluded IPs from analysis (wh
itelisted): 184.29.183.29, 20. 109.210.53 - Excluded domains from analysis
(whitelisted): a-ring-fallbac k.msedge.net, fs.microsoft.com , slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.co m - Execution Graph export aborted
for target stage6.exe, PID 62 72 because it is empty - Not all processes where analyz
ed, report is missing behavior information - Report size getting too big, t
oo many NtAllocateVirtualMemor y calls found. - Report size getting too big, t
oo many NtOpenKeyEx calls foun d. - Report size getting too big, t
oo many NtProtectVirtualMemory calls found. - Report size getting too big, t
oo many NtQueryValueKey calls found.
Time | Type | Description |
---|---|---|
23:33:31 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
104.21.32.1 | Get hash | malicious | FormBook | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
23.52.218.12 | Get hash | malicious | Amadey, LummaC Stealer, RHADAMANTHYS | Browse | ||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | Amadey, CryptOne, LummaC Stealer | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | Amadey, LummaC Stealer, RHADAMANTHYS | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | Unknown | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
steamcommunity.com | Get hash | malicious | Amadey, Credential Flusher, Healer AV Disabler, LummaC Stealer | Browse |
| |
Get hash | malicious | Amadey, Credential Flusher, Healer AV Disabler, LummaC Stealer | Browse |
| ||
Get hash | malicious | Amadey, Credential Flusher, Healer AV Disabler, LummaC Stealer | Browse |
| ||
Get hash | malicious | Amadey, LummaC Stealer, RHADAMANTHYS | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Amadey, CryptOne, LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
surmisehotte.click | Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
TelecentroSAAR | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Amadey, LummaC Stealer, RHADAMANTHYS | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Amadey, CryptOne, LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Amadey, LummaC Stealer, RHADAMANTHYS | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
CLOUDFLARENETUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | AsyncRAT, XWorm | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Python Stealer, Blank Grabber, Exela Stealer, Umbral Stealer | Browse |
| ||
Get hash | malicious | HTMLPhisher, Invisible JS, Tycoon2FA | Browse |
| ||
Get hash | malicious | AgentTesla, GuLoader | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | MSIL Logger, MassLogger RAT | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC Stealer | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LCRYX | Browse |
| ||
Get hash | malicious | MSIL Logger, MassLogger RAT | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
|
File type: | |
Entropy (8bit): | 7.4951662203772385 |
TrID: |
|
File name: | stage6.exe |
File size: | 1'657'856 bytes |
MD5: | 03be1ee0944764446cd61be6ae8cc497 |
SHA1: | a8007574c5a81af39d193b19a29cc2fde8305f26 |
SHA256: | ca00dbff57cdc83f39a213ea96726063f18aa14f9a0ae2f52c2c6d54f23dcd00 |
SHA512: | 5485608698ec5db99f298ef9d080ddaab94051c7d3411171e3f3ea996758d1843ff973f7dd2fcdba1532d43a51e51c5da70b25818ee9f6a0543e0cfdcb6026e4 |
SSDEEP: | 24576:DHlYQzwg8Myznor627VGOTZ7ND3EvxSvqdbeyIAkmsHiEE1BNCmxZh+tEu8B:DG+6EVjZR3EpIqdyRms4Xh+th |
TLSH: | C775BF03B6A78AF0E69C1B33C4E7881403E4D98577EFE71EB469335526113AADE0259F |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.../.fg.................B...........a... ........@.. ....................................`................................ |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x5961de |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x6766D52F [Sat Dec 21 14:48:15 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x196190 | 0x4b | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x198000 | 0x568 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x19a000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0x1941e4 | 0x194200 | 13cf54b1b8c948d473c300ce15d70740 | False | 0.7979122767166719 | data | 7.498920761662283 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0x198000 | 0x568 | 0x600 | 54162d51ef77a776df8187ff113dc38e | False | 0.4108072916666667 | data | 3.970234351915508 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x19a000 | 0xc | 0x200 | 65d83e1f73a9e96c123f859063b8aad4 | False | 0.044921875 | data | 0.10191042566270775 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0x1980a0 | 0x2dc | data | 0.44672131147540983 | ||
RT_MANIFEST | 0x19837c | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.5489795918367347 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Description | Data |
---|---|
Translation | 0x0000 0x04b0 |
Comments | |
CompanyName | |
FileDescription | 1 |
FileVersion | 1.0.0.0 |
InternalName | 1.exe |
LegalCopyright | Copyright 2018 |
LegalTrademarks | |
OriginalFilename | 1.exe |
ProductName | 1 |
ProductVersion | 1.0.0.0 |
Assembly Version | 1.0.0.0 |
Download Network PCAP: filtered – full
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-04-27T05:33:12.042328+0200 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49713 | 104.21.32.1 | 443 | TCP |
2025-04-27T05:33:31.658514+0200 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.4 | 49713 | 104.21.32.1 | 443 | TCP |
2025-04-27T05:33:31.658514+0200 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49713 | 104.21.32.1 | 443 | TCP |
2025-04-27T05:33:31.666749+0200 | 2058364 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (grannyejh .lat) | 1 | 192.168.2.4 | 62128 | 1.1.1.1 | 53 | UDP |
2025-04-27T05:33:31.839059+0200 | 2058360 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (discokeyus .lat) | 1 | 192.168.2.4 | 53817 | 1.1.1.1 | 53 | UDP |
2025-04-27T05:33:31.997019+0200 | 2058370 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (necklacebudi .lat) | 1 | 192.168.2.4 | 63267 | 1.1.1.1 | 53 | UDP |
2025-04-27T05:33:32.159469+0200 | 2058362 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (energyaffai .lat) | 1 | 192.168.2.4 | 60567 | 1.1.1.1 | 53 | UDP |
2025-04-27T05:33:32.325443+0200 | 2058354 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (aspecteirs .lat) | 1 | 192.168.2.4 | 57042 | 1.1.1.1 | 53 | UDP |
2025-04-27T05:33:32.490041+0200 | 2058376 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (sustainskelet .lat) | 1 | 192.168.2.4 | 64227 | 1.1.1.1 | 53 | UDP |
2025-04-27T05:33:32.653417+0200 | 2058358 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (crosshuaht .lat) | 1 | 192.168.2.4 | 55368 | 1.1.1.1 | 53 | UDP |
2025-04-27T05:33:32.822532+0200 | 2058374 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (rapeflowwj .lat) | 1 | 192.168.2.4 | 58847 | 1.1.1.1 | 53 | UDP |
2025-04-27T05:33:33.426687+0200 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49722 | 23.52.218.12 | 443 | TCP |
2025-04-27T05:33:33.824801+0200 | 2858666 | ETPRO MALWARE Win32/Lumma Stealer Steam Profile Lookup | 1 | 192.168.2.4 | 49722 | 23.52.218.12 | 443 | TCP |
- Total Packets: 35
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 27, 2025 05:33:11.726566076 CEST | 49713 | 443 | 192.168.2.4 | 104.21.32.1 |
Apr 27, 2025 05:33:11.726603031 CEST | 443 | 49713 | 104.21.32.1 | 192.168.2.4 |
Apr 27, 2025 05:33:11.726680040 CEST | 49713 | 443 | 192.168.2.4 | 104.21.32.1 |
Apr 27, 2025 05:33:11.729679108 CEST | 49713 | 443 | 192.168.2.4 | 104.21.32.1 |
Apr 27, 2025 05:33:11.729693890 CEST | 443 | 49713 | 104.21.32.1 | 192.168.2.4 |
Apr 27, 2025 05:33:12.042243004 CEST | 443 | 49713 | 104.21.32.1 | 192.168.2.4 |
Apr 27, 2025 05:33:12.042327881 CEST | 49713 | 443 | 192.168.2.4 | 104.21.32.1 |
Apr 27, 2025 05:33:12.049531937 CEST | 49713 | 443 | 192.168.2.4 | 104.21.32.1 |
Apr 27, 2025 05:33:12.049551010 CEST | 443 | 49713 | 104.21.32.1 | 192.168.2.4 |
Apr 27, 2025 05:33:12.049751043 CEST | 443 | 49713 | 104.21.32.1 | 192.168.2.4 |
Apr 27, 2025 05:33:12.101322889 CEST | 49713 | 443 | 192.168.2.4 | 104.21.32.1 |
Apr 27, 2025 05:33:12.137073994 CEST | 49713 | 443 | 192.168.2.4 | 104.21.32.1 |
Apr 27, 2025 05:33:12.137115955 CEST | 49713 | 443 | 192.168.2.4 | 104.21.32.1 |
Apr 27, 2025 05:33:12.137160063 CEST | 443 | 49713 | 104.21.32.1 | 192.168.2.4 |
Apr 27, 2025 05:33:31.658548117 CEST | 443 | 49713 | 104.21.32.1 | 192.168.2.4 |
Apr 27, 2025 05:33:31.658611059 CEST | 443 | 49713 | 104.21.32.1 | 192.168.2.4 |
Apr 27, 2025 05:33:31.658682108 CEST | 49713 | 443 | 192.168.2.4 | 104.21.32.1 |
Apr 27, 2025 05:33:31.659921885 CEST | 49713 | 443 | 192.168.2.4 | 104.21.32.1 |
Apr 27, 2025 05:33:31.659939051 CEST | 443 | 49713 | 104.21.32.1 | 192.168.2.4 |
Apr 27, 2025 05:33:33.138675928 CEST | 49722 | 443 | 192.168.2.4 | 23.52.218.12 |
Apr 27, 2025 05:33:33.138710022 CEST | 443 | 49722 | 23.52.218.12 | 192.168.2.4 |
Apr 27, 2025 05:33:33.138773918 CEST | 49722 | 443 | 192.168.2.4 | 23.52.218.12 |
Apr 27, 2025 05:33:33.139448881 CEST | 49722 | 443 | 192.168.2.4 | 23.52.218.12 |
Apr 27, 2025 05:33:33.139461040 CEST | 443 | 49722 | 23.52.218.12 | 192.168.2.4 |
Apr 27, 2025 05:33:33.426487923 CEST | 443 | 49722 | 23.52.218.12 | 192.168.2.4 |
Apr 27, 2025 05:33:33.426687002 CEST | 49722 | 443 | 192.168.2.4 | 23.52.218.12 |
Apr 27, 2025 05:33:33.428261042 CEST | 49722 | 443 | 192.168.2.4 | 23.52.218.12 |
Apr 27, 2025 05:33:33.428268909 CEST | 443 | 49722 | 23.52.218.12 | 192.168.2.4 |
Apr 27, 2025 05:33:33.428463936 CEST | 443 | 49722 | 23.52.218.12 | 192.168.2.4 |
Apr 27, 2025 05:33:33.429790020 CEST | 49722 | 443 | 192.168.2.4 | 23.52.218.12 |
Apr 27, 2025 05:33:33.476273060 CEST | 443 | 49722 | 23.52.218.12 | 192.168.2.4 |
Apr 27, 2025 05:33:33.824841022 CEST | 443 | 49722 | 23.52.218.12 | 192.168.2.4 |
Apr 27, 2025 05:33:33.824863911 CEST | 443 | 49722 | 23.52.218.12 | 192.168.2.4 |
Apr 27, 2025 05:33:33.824877024 CEST | 443 | 49722 | 23.52.218.12 | 192.168.2.4 |
Apr 27, 2025 05:33:33.824939966 CEST | 49722 | 443 | 192.168.2.4 | 23.52.218.12 |
Apr 27, 2025 05:33:33.824959993 CEST | 443 | 49722 | 23.52.218.12 | 192.168.2.4 |
Apr 27, 2025 05:33:33.824987888 CEST | 49722 | 443 | 192.168.2.4 | 23.52.218.12 |
Apr 27, 2025 05:33:33.825016022 CEST | 49722 | 443 | 192.168.2.4 | 23.52.218.12 |
Apr 27, 2025 05:33:33.962210894 CEST | 443 | 49722 | 23.52.218.12 | 192.168.2.4 |
Apr 27, 2025 05:33:33.962259054 CEST | 443 | 49722 | 23.52.218.12 | 192.168.2.4 |
Apr 27, 2025 05:33:33.962311983 CEST | 49722 | 443 | 192.168.2.4 | 23.52.218.12 |
Apr 27, 2025 05:33:33.962336063 CEST | 443 | 49722 | 23.52.218.12 | 192.168.2.4 |
Apr 27, 2025 05:33:33.962385893 CEST | 49722 | 443 | 192.168.2.4 | 23.52.218.12 |
Apr 27, 2025 05:33:33.974440098 CEST | 443 | 49722 | 23.52.218.12 | 192.168.2.4 |
Apr 27, 2025 05:33:33.974508047 CEST | 443 | 49722 | 23.52.218.12 | 192.168.2.4 |
Apr 27, 2025 05:33:33.974555016 CEST | 49722 | 443 | 192.168.2.4 | 23.52.218.12 |
Apr 27, 2025 05:33:33.974594116 CEST | 49722 | 443 | 192.168.2.4 | 23.52.218.12 |
Apr 27, 2025 05:33:33.974724054 CEST | 49722 | 443 | 192.168.2.4 | 23.52.218.12 |
Apr 27, 2025 05:33:33.974735975 CEST | 443 | 49722 | 23.52.218.12 | 192.168.2.4 |
Apr 27, 2025 05:33:33.974750996 CEST | 49722 | 443 | 192.168.2.4 | 23.52.218.12 |
Apr 27, 2025 05:33:33.974756002 CEST | 443 | 49722 | 23.52.218.12 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 27, 2025 05:33:11.546150923 CEST | 61987 | 53 | 192.168.2.4 | 1.1.1.1 |
Apr 27, 2025 05:33:11.719497919 CEST | 53 | 61987 | 1.1.1.1 | 192.168.2.4 |
Apr 27, 2025 05:33:31.666749001 CEST | 62128 | 53 | 192.168.2.4 | 1.1.1.1 |
Apr 27, 2025 05:33:31.835705042 CEST | 53 | 62128 | 1.1.1.1 | 192.168.2.4 |
Apr 27, 2025 05:33:31.839059114 CEST | 53817 | 53 | 192.168.2.4 | 1.1.1.1 |
Apr 27, 2025 05:33:31.993983030 CEST | 53 | 53817 | 1.1.1.1 | 192.168.2.4 |
Apr 27, 2025 05:33:31.997019053 CEST | 63267 | 53 | 192.168.2.4 | 1.1.1.1 |
Apr 27, 2025 05:33:32.156656981 CEST | 53 | 63267 | 1.1.1.1 | 192.168.2.4 |
Apr 27, 2025 05:33:32.159468889 CEST | 60567 | 53 | 192.168.2.4 | 1.1.1.1 |
Apr 27, 2025 05:33:32.322485924 CEST | 53 | 60567 | 1.1.1.1 | 192.168.2.4 |
Apr 27, 2025 05:33:32.325443029 CEST | 57042 | 53 | 192.168.2.4 | 1.1.1.1 |
Apr 27, 2025 05:33:32.487524033 CEST | 53 | 57042 | 1.1.1.1 | 192.168.2.4 |
Apr 27, 2025 05:33:32.490041018 CEST | 64227 | 53 | 192.168.2.4 | 1.1.1.1 |
Apr 27, 2025 05:33:32.650350094 CEST | 53 | 64227 | 1.1.1.1 | 192.168.2.4 |
Apr 27, 2025 05:33:32.653417110 CEST | 55368 | 53 | 192.168.2.4 | 1.1.1.1 |
Apr 27, 2025 05:33:32.819885015 CEST | 53 | 55368 | 1.1.1.1 | 192.168.2.4 |
Apr 27, 2025 05:33:32.822531939 CEST | 58847 | 53 | 192.168.2.4 | 1.1.1.1 |
Apr 27, 2025 05:33:32.995897055 CEST | 53 | 58847 | 1.1.1.1 | 192.168.2.4 |
Apr 27, 2025 05:33:32.997597933 CEST | 60713 | 53 | 192.168.2.4 | 1.1.1.1 |
Apr 27, 2025 05:33:33.137676001 CEST | 53 | 60713 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Apr 27, 2025 05:33:11.546150923 CEST | 192.168.2.4 | 1.1.1.1 | 0x2817 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Apr 27, 2025 05:33:31.666749001 CEST | 192.168.2.4 | 1.1.1.1 | 0x45e7 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Apr 27, 2025 05:33:31.839059114 CEST | 192.168.2.4 | 1.1.1.1 | 0x3872 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Apr 27, 2025 05:33:31.997019053 CEST | 192.168.2.4 | 1.1.1.1 | 0xce15 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Apr 27, 2025 05:33:32.159468889 CEST | 192.168.2.4 | 1.1.1.1 | 0x3cb9 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Apr 27, 2025 05:33:32.325443029 CEST | 192.168.2.4 | 1.1.1.1 | 0x230f | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Apr 27, 2025 05:33:32.490041018 CEST | 192.168.2.4 | 1.1.1.1 | 0x6450 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Apr 27, 2025 05:33:32.653417110 CEST | 192.168.2.4 | 1.1.1.1 | 0x661d | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Apr 27, 2025 05:33:32.822531939 CEST | 192.168.2.4 | 1.1.1.1 | 0xc23a | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Apr 27, 2025 05:33:32.997597933 CEST | 192.168.2.4 | 1.1.1.1 | 0x5c1f | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Apr 27, 2025 05:33:11.719497919 CEST | 1.1.1.1 | 192.168.2.4 | 0x2817 | No error (0) | 104.21.32.1 | A (IP address) | IN (0x0001) | false | ||
Apr 27, 2025 05:33:11.719497919 CEST | 1.1.1.1 | 192.168.2.4 | 0x2817 | No error (0) | 104.21.80.1 | A (IP address) | IN (0x0001) | false | ||
Apr 27, 2025 05:33:11.719497919 CEST | 1.1.1.1 | 192.168.2.4 | 0x2817 | No error (0) | 104.21.64.1 | A (IP address) | IN (0x0001) | false | ||
Apr 27, 2025 05:33:11.719497919 CEST | 1.1.1.1 | 192.168.2.4 | 0x2817 | No error (0) | 104.21.48.1 | A (IP address) | IN (0x0001) | false | ||
Apr 27, 2025 05:33:11.719497919 CEST | 1.1.1.1 | 192.168.2.4 | 0x2817 | No error (0) | 104.21.112.1 | A (IP address) | IN (0x0001) | false | ||
Apr 27, 2025 05:33:11.719497919 CEST | 1.1.1.1 | 192.168.2.4 | 0x2817 | No error (0) | 104.21.96.1 | A (IP address) | IN (0x0001) | false | ||
Apr 27, 2025 05:33:11.719497919 CEST | 1.1.1.1 | 192.168.2.4 | 0x2817 | No error (0) | 104.21.16.1 | A (IP address) | IN (0x0001) | false | ||
Apr 27, 2025 05:33:31.835705042 CEST | 1.1.1.1 | 192.168.2.4 | 0x45e7 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Apr 27, 2025 05:33:31.993983030 CEST | 1.1.1.1 | 192.168.2.4 | 0x3872 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Apr 27, 2025 05:33:32.156656981 CEST | 1.1.1.1 | 192.168.2.4 | 0xce15 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Apr 27, 2025 05:33:32.322485924 CEST | 1.1.1.1 | 192.168.2.4 | 0x3cb9 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Apr 27, 2025 05:33:32.487524033 CEST | 1.1.1.1 | 192.168.2.4 | 0x230f | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Apr 27, 2025 05:33:32.650350094 CEST | 1.1.1.1 | 192.168.2.4 | 0x6450 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Apr 27, 2025 05:33:32.819885015 CEST | 1.1.1.1 | 192.168.2.4 | 0x661d | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Apr 27, 2025 05:33:32.995897055 CEST | 1.1.1.1 | 192.168.2.4 | 0xc23a | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Apr 27, 2025 05:33:33.137676001 CEST | 1.1.1.1 | 192.168.2.4 | 0x5c1f | No error (0) | 23.52.218.12 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49713 | 104.21.32.1 | 443 | 6536 | C:\Users\user\Desktop\stage6.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-04-27 03:33:12 UTC | 265 | OUT | |
2025-04-27 03:33:12 UTC | 8 | OUT | |
2025-04-27 03:33:31 UTC | 238 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49722 | 23.52.218.12 | 443 | 6536 | C:\Users\user\Desktop\stage6.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-04-27 03:33:33 UTC | 219 | OUT | |
2025-04-27 03:33:33 UTC | 1974 | IN | |
2025-04-27 03:33:33 UTC | 14410 | IN | |
2025-04-27 03:33:33 UTC | 10166 | IN | |
2025-04-27 03:33:33 UTC | 5389 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 23:33:10 |
Start date: | 26/04/2025 |
Path: | C:\Users\user\Desktop\stage6.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xe80000 |
File size: | 1'657'856 bytes |
MD5 hash: | 03BE1EE0944764446CD61BE6AE8CC497 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 23:33:10 |
Start date: | 26/04/2025 |
Path: | C:\Users\user\Desktop\stage6.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x5d0000 |
File size: | 1'657'856 bytes |
MD5 hash: | 03BE1EE0944764446CD61BE6AE8CC497 |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage
Dynamic/Packed Code Coverage
Signature Coverage
Execution Coverage: | 2.1% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 15.1% |
Total number of Nodes: | 73 |
Total number of Limit Nodes: | 7 |
Graph
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|