Source: 1736984347371a50bb0db16e949acb4c3af87392a95fb7ecf9fb132043ee481016955a921b361.dat-decoded.exe |
Avira: detected |
Source: 1736984347371a50bb0db16e949acb4c3af87392a95fb7ecf9fb132043ee481016955a921b361.dat-decoded.exe |
Malware Configuration Extractor: LummaC {"C2 url": ["immolatechallen.bond", "sobrattyeu.bond", "jarry-fixxer.bond", "crookedfoshe.bond", "jarry-deatile.bond", "stripedre-lot.bond", "strivehelpeu.bond", "growthselec.bond", "pain-temper.bond"], "Build id": "PeL9hR--"} |
Source: Submited Sample |
Integrated Neural Analysis Model: Matched 80.8% probability |
Source: 1736984347371a50bb0db16e949acb4c3af87392a95fb7ecf9fb132043ee481016955a921b361.dat-decoded.exe |
Joe Sandbox ML: detected |
Source: 1736984347371a50bb0db16e949acb4c3af87392a95fb7ecf9fb132043ee481016955a921b361.dat-decoded.exe |
String decryptor: jarry-fixxer.bond |
Source: 1736984347371a50bb0db16e949acb4c3af87392a95fb7ecf9fb132043ee481016955a921b361.dat-decoded.exe |
String decryptor: pain-temper.bond |
Source: 1736984347371a50bb0db16e949acb4c3af87392a95fb7ecf9fb132043ee481016955a921b361.dat-decoded.exe |
String decryptor: jarry-deatile.bond |
Source: 1736984347371a50bb0db16e949acb4c3af87392a95fb7ecf9fb132043ee481016955a921b361.dat-decoded.exe |
String decryptor: growthselec.bond |
Source: 1736984347371a50bb0db16e949acb4c3af87392a95fb7ecf9fb132043ee481016955a921b361.dat-decoded.exe |
String decryptor: stripedre-lot.bond |
Source: 1736984347371a50bb0db16e949acb4c3af87392a95fb7ecf9fb132043ee481016955a921b361.dat-decoded.exe |
String decryptor: immolatechallen.bond |
Source: 1736984347371a50bb0db16e949acb4c3af87392a95fb7ecf9fb132043ee481016955a921b361.dat-decoded.exe |
String decryptor: crookedfoshe.bond |
Source: 1736984347371a50bb0db16e949acb4c3af87392a95fb7ecf9fb132043ee481016955a921b361.dat-decoded.exe |
String decryptor: strivehelpeu.bond |
Source: 1736984347371a50bb0db16e949acb4c3af87392a95fb7ecf9fb132043ee481016955a921b361.dat-decoded.exe |
String decryptor: sobrattyeu.bond |
Source: 1736984347371a50bb0db16e949acb4c3af87392a95fb7ecf9fb132043ee481016955a921b361.dat-decoded.exe |
String decryptor: lid=%s&j=%s&ver=4.0 |
Source: 1736984347371a50bb0db16e949acb4c3af87392a95fb7ecf9fb132043ee481016955a921b361.dat-decoded.exe |
String decryptor: TeslaBrowser/5.5 |
Source: 1736984347371a50bb0db16e949acb4c3af87392a95fb7ecf9fb132043ee481016955a921b361.dat-decoded.exe |
String decryptor: - Screen Resoluton: |
Source: 1736984347371a50bb0db16e949acb4c3af87392a95fb7ecf9fb132043ee481016955a921b361.dat-decoded.exe |
String decryptor: - Physical Installed Memory: |
Source: 1736984347371a50bb0db16e949acb4c3af87392a95fb7ecf9fb132043ee481016955a921b361.dat-decoded.exe |
String decryptor: Workgroup: - |
Source: 1736984347371a50bb0db16e949acb4c3af87392a95fb7ecf9fb132043ee481016955a921b361.dat-decoded.exe |
String decryptor: PeL9hR-- |
Source: 1736984347371a50bb0db16e949acb4c3af87392a95fb7ecf9fb132043ee481016955a921b361.dat-decoded.exe |
Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: 1736984347371a50bb0db16e949acb4c3af87392a95fb7ecf9fb132043ee481016955a921b361.dat-decoded.exe |
Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: Malware configuration extractor |
URLs: immolatechallen.bond |
Source: Malware configuration extractor |
URLs: sobrattyeu.bond |
Source: Malware configuration extractor |
URLs: jarry-fixxer.bond |
Source: Malware configuration extractor |
URLs: crookedfoshe.bond |
Source: Malware configuration extractor |
URLs: jarry-deatile.bond |
Source: Malware configuration extractor |
URLs: stripedre-lot.bond |
Source: Malware configuration extractor |
URLs: strivehelpeu.bond |
Source: Malware configuration extractor |
URLs: growthselec.bond |
Source: Malware configuration extractor |
URLs: pain-temper.bond |
Source: 1736984347371a50bb0db16e949acb4c3af87392a95fb7ecf9fb132043ee481016955a921b361.dat-decoded.exe |
Static PE information: section name: @.data |
Source: 1736984347371a50bb0db16e949acb4c3af87392a95fb7ecf9fb132043ee481016955a921b361.dat-decoded.exe |
Static PE information: No import functions for PE file found |
Source: 1736984347371a50bb0db16e949acb4c3af87392a95fb7ecf9fb132043ee481016955a921b361.dat-decoded.exe |
Static PE information: Data appended to the last section found |
Source: 1736984347371a50bb0db16e949acb4c3af87392a95fb7ecf9fb132043ee481016955a921b361.dat-decoded.exe |
Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: classification engine |
Classification label: mal88.troj.evad.winEXE@0/0@0/0 |
Source: 1736984347371a50bb0db16e949acb4c3af87392a95fb7ecf9fb132043ee481016955a921b361.dat-decoded.exe |
Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: 1736984347371a50bb0db16e949acb4c3af87392a95fb7ecf9fb132043ee481016955a921b361.dat-decoded.exe |
Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: 1736984347371a50bb0db16e949acb4c3af87392a95fb7ecf9fb132043ee481016955a921b361.dat-decoded.exe |
Static PE information: section name: .relo |
Source: 1736984347371a50bb0db16e949acb4c3af87392a95fb7ecf9fb132043ee481016955a921b361.dat-decoded.exe |
Static PE information: section name: @.data |
Source: 1736984347371a50bb0db16e949acb4c3af87392a95fb7ecf9fb132043ee481016955a921b361.dat-decoded.exe |
String found in binary or memory: growthselec.bond |
Source: 1736984347371a50bb0db16e949acb4c3af87392a95fb7ecf9fb132043ee481016955a921b361.dat-decoded.exe |
String found in binary or memory: immolatechallen.bond |
Source: 1736984347371a50bb0db16e949acb4c3af87392a95fb7ecf9fb132043ee481016955a921b361.dat-decoded.exe |
String found in binary or memory: crookedfoshe.bond |
Source: 1736984347371a50bb0db16e949acb4c3af87392a95fb7ecf9fb132043ee481016955a921b361.dat-decoded.exe |
String found in binary or memory: strivehelpeu.bond |
Source: 1736984347371a50bb0db16e949acb4c3af87392a95fb7ecf9fb132043ee481016955a921b361.dat-decoded.exe |
String found in binary or memory: sobrattyeu.bond |
Source: Yara match |
File source: decrypted.binstr, type: MEMORYSTR |
Source: Yara match |
File source: decrypted.binstr, type: MEMORYSTR |