Click to jump to signature section
Source: http://77.73.133.53/cloud/index.php | Avira URL Cloud: Label: malware |
Source: http://77.73.133.53/cloud/index.php | Virustotal: Detection: 10% | Perma Link |
Source: 0.2.loaddll32.exe.10000000.0.unpack | Malware Configuration Extractor: Erbium Stealer {"C2 list": ["http://77.73.133.53/cloud/index.php"]} |
Source: loaddll32.exe, 00000000.00000002.241663791.0000000010255000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: -----BEGIN PUBLIC KEY----- | |
Source: Malware configuration extractor | URLs: http://77.73.133.53/cloud/index.php |
Source: loaddll32.exe, 00000000.00000002.241663791.0000000010255000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000003.00000000.244878640.0000000010255000.00000002.00000001.01000000.00000003.sdmp, 478fukupP9.dll | String found in binary or memory: http://www.winimage.com/zLibDll |
Source: loaddll32.exe, 00000000.00000002.241663791.0000000010255000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000003.00000000.244878640.0000000010255000.00000002.00000001.01000000.00000003.sdmp, 478fukupP9.dll | String found in binary or memory: http://www.winimage.com/zLibDll1.2.11.1-motley.z%02d...././///.//../6666666666666666jjjjjjjjjjjjjjjj |
Source: loaddll32.exe, 00000000.00000002.241663791.0000000010255000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000003.00000000.244878640.0000000010255000.00000002.00000001.01000000.00000003.sdmp, 478fukupP9.dll | String found in binary or memory: https://curl.se/docs/alt-svc.html |
Source: loaddll32.exe, 00000000.00000002.241663791.0000000010255000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000003.00000000.244878640.0000000010255000.00000002.00000001.01000000.00000003.sdmp, 478fukupP9.dll | String found in binary or memory: https://curl.se/docs/hsts.html |
Source: loaddll32.exe, 00000000.00000002.241663791.0000000010255000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000003.00000000.244878640.0000000010255000.00000002.00000001.01000000.00000003.sdmp, 478fukupP9.dll | String found in binary or memory: https://curl.se/docs/http-cookies.html |
Source: loaddll32.exe, 00000000.00000002.241205230.0000000000DEB000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/> | |
Source: 478fukupP9.dll, type: SAMPLE | Matched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen |
Source: 3.0.rundll32.exe.10000000.1.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen |
Source: 0.2.loaddll32.exe.10000000.0.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen |
Source: 3.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen |
Source: 3.0.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen |
Source: 00000003.00000002.254490404.0000000010255000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen |
Source: 00000000.00000002.241663791.0000000010255000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen |
Source: 00000003.00000000.242990269.0000000010255000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen |
Source: 00000003.00000000.244878640.0000000010255000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen |
Source: Process Memory Space: loaddll32.exe PID: 2788, type: MEMORYSTR | Matched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen |
Source: Process Memory Space: rundll32.exe PID: 4908, type: MEMORYSTR | Matched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen |
Source: 478fukupP9.dll, type: SAMPLE | Matched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions |
Source: 3.0.rundll32.exe.10000000.1.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions |
Source: 0.2.loaddll32.exe.10000000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions |
Source: 3.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions |
Source: 3.0.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions |
Source: 00000003.00000002.254490404.0000000010255000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions |
Source: 00000000.00000002.241663791.0000000010255000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions |
Source: 00000003.00000000.242990269.0000000010255000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions |
Source: 00000003.00000000.244878640.0000000010255000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions |
Source: Process Memory Space: loaddll32.exe PID: 2788, type: MEMORYSTR | Matched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions |
Source: Process Memory Space: rundll32.exe PID: 4908, type: MEMORYSTR | Matched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions |
Source: C:\Windows\SysWOW64\rundll32.exe | Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4908 -s 640 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_101A9B30 | 0_2_101A9B30 |
Source: C:\Windows\System32\loaddll32.exe | Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\478fukupP9.dll",#1 |
Source: unknown | Process created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\478fukupP9.dll" | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\478fukupP9.dll",#1 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\478fukupP9.dll",#1 | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4908 -s 640 | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\478fukupP9.dll",#1 | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\478fukupP9.dll",#1 | Jump to behavior |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5016:120:WilError_01 |
Source: C:\Windows\SysWOW64\WerFault.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4908 |
Source: C:\Windows\SysWOW64\WerFault.exe | File created: C:\ProgramData\Microsoft\Windows\WER\Temp\WER5C69.tmp | Jump to behavior |
Source: classification engine | Classification label: mal76.troj.winDLL@7/4@0/0 |
Source: C:\Windows\SysWOW64\WerFault.exe | File read: C:\Windows\System32\drivers\etc\hosts | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | File read: C:\Windows\System32\drivers\etc\hosts | Jump to behavior |
Source: loaddll32.exe, 00000000.00000002.241663791.0000000010255000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000003.00000000.244878640.0000000010255000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: UPDATE %Q.%s SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger'); |
Source: loaddll32.exe, 00000000.00000002.241663791.0000000010255000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000003.00000000.244878640.0000000010255000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q); |
Source: 478fukupP9.dll | Static file information: File size 2877955 > 1048576 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_010FAD48 push eax; iretd | 3_2_010FAD49 |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_010FA1C0 str word ptr [eax+010E3C30h] | 3_2_010FA1C0 |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_010F08C4 sidt fword ptr [ecx+edx*4] | 3_2_010F08C4 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 3_2_010F08C4 sgdt fword ptr [ecx] | 3_2_010F08C4 |
Source: C:\Windows\System32\loaddll32.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\478fukupP9.dll",#1 | Jump to behavior |
Source: Yara match | File source: 478fukupP9.dll, type: SAMPLE |
Source: Yara match | File source: 3.0.rundll32.exe.10000000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.loaddll32.exe.10000000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 3.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 3.0.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000003.00000002.254160360.0000000010001000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000000.242673427.0000000010001000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000000.243200020.0000000010001000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.241220841.0000000010001000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 478fukupP9.dll, type: SAMPLE |
Source: Yara match | File source: 3.0.rundll32.exe.10000000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.loaddll32.exe.10000000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 3.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 3.0.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000003.00000002.254160360.0000000010001000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000000.242673427.0000000010001000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000000.243200020.0000000010001000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.241220841.0000000010001000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |