D:\ИСХОДНИКИ ФУРИОНА\Furion 1.711\Release\Furion hack.pdb
Behavioral task
behavioral1
Sample
Furion hack.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Furion hack.dll
Resource
win10v2004-20240226-en
General
-
Target
Furion hack.dll
-
Size
1.6MB
-
MD5
061dbe681f87a58da28a5c59a8f38d68
-
SHA1
3bf1e112bc149f14e5d931794cc593df7236fe49
-
SHA256
934c3166fa0bbaa60cd7ee3f70ae959a78b7d4628a513339b8cf3cca105bec08
-
SHA512
0b23917a888bb42caf4d361ee7da4d5382ada977e1279f0ca1fd915688ac37824aa5f30e9f47fcf6d643ea2b7b6d1afd8ea91776db139635e713bda4d07c3404
-
SSDEEP
24576:rB1ljci6XvYZLkYINcVDP3z32fI24Ik3imgRIyHg:rfQO3+I2Vk3UIyHg
Malware Config
Signatures
-
Detect Lumma Stealer payload V4 1 IoCs
resource yara_rule sample family_lumma_v4 -
Lumma family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Furion hack.dll
Files
-
Furion hack.dll.dll windows:6 windows x86 arch:x86
51198fe8b386141421ee6195740ccd44
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
K32GetMappedFileNameA
FreeLibraryAndExitThread
Sleep
VirtualQueryEx
SetPriorityClass
GetModuleHandleA
OpenProcess
GetLastError
DisableThreadLibraryCalls
CreateThread
GetCurrentProcessId
CreateDirectoryA
FormatMessageA
GlobalAlloc
GlobalLock
GlobalUnlock
MultiByteToWideChar
QueryPerformanceFrequency
QueryPerformanceCounter
MoveFileA
TerminateProcess
VirtualQuery
GetProcAddress
GetTickCount
FindFirstFileA
SetLastError
FindNextFileA
FindClose
GetFileAttributesA
DeleteFileA
SetFileAttributesA
RemoveDirectoryA
FlushInstructionCache
SetEndOfFile
WriteConsoleW
HeapSize
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
DeleteFileW
GetTimeZoneInformation
ReadConsoleW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
GetCurrentProcess
GetConsoleMode
GetConsoleOutputCP
WriteFile
FlushFileBuffers
SetFilePointerEx
GetFileSizeEx
GetFileType
GetStdHandle
ReadFile
GetModuleHandleExW
ExitProcess
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
LoadLibraryExW
GetModuleFileNameW
InterlockedFlushSList
RtlUnwind
FreeLibrary
GetProcessHeap
InitializeSListHead
GetStartupInfoW
RaiseException
IsDebuggerPresent
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
CreateEventW
WaitForSingleObjectEx
ResetEvent
SetEvent
InitializeCriticalSectionAndSpinCount
GetCPInfo
LCMapStringEx
DecodePointer
EncodePointer
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetSystemTimeAsFileTime
VirtualProtect
CompareStringW
GetModuleFileNameA
CloseHandle
HeapCreate
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
GetCurrentThreadId
OpenThread
SuspendThread
ResumeThread
GetThreadContext
SetThreadContext
GetModuleHandleW
CreateToolhelp32Snapshot
Thread32First
Thread32Next
VirtualAlloc
VirtualFree
LocalFree
GetLocaleInfoEx
CreateDirectoryW
CreateFileW
FindFirstFileW
FindFirstFileExW
FindNextFileW
GetFileAttributesExW
AreFileApisANSI
GetFileInformationByHandleEx
WideCharToMultiByte
GetStringTypeW
InitializeCriticalSectionEx
user32
SetWindowLongA
EnumWindows
IsWindowVisible
GetWindow
GetCursorPos
SetClipboardData
GetClipboardData
EmptyClipboard
CloseClipboard
OpenClipboard
CallWindowProcA
GetWindowThreadProcessId
GetKeyState
MessageBoxA
GetAsyncKeyState
SendMessageA
ShowCursor
shell32
ShellExecuteA
oleaut32
VariantClear
opengl32
glPolygonMode
glEnable
glLineWidth
glDisable
glDepthFunc
glFogi
glFogfv
glFogf
glClearColor
glClear
glGetIntegerv
glPushAttrib
glOrtho
glPixelStorei
glPushMatrix
glDrawElements
glColorPointer
glTexImage2D
glTexCoordPointer
glDeleteTextures
glTexParameteri
glLoadIdentity
glBlendFunc
glMatrixMode
glDisableClientState
glScissor
glVertexPointer
glGenTextures
glBindTexture
glPopAttrib
glEnableClientState
glViewport
glPopMatrix
ws2_32
WSACleanup
imm32
ImmSetCompositionWindow
ImmGetContext
Sections
.text Size: 973KB - Virtual size: 972KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 267KB - Virtual size: 266KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 317KB - Virtual size: 765KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 70KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ