D:\ИСХОДНИКИ ФУРИОНА\Furion 1.795\Release\Furion hack.pdb
Behavioral task
behavioral1
Sample
Furion hack.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Furion hack.dll
Resource
win10v2004-20240226-en
General
-
Target
Furion hack.dll
-
Size
1.7MB
-
MD5
0ec9b5a56a4fa761901f25f2834d32e3
-
SHA1
b153b60bd80184299e20a449be1e74a2cfb02ec7
-
SHA256
af88b4a7ee9402cde864143472a6570760b5607c7003def31fd060414ed1bbf7
-
SHA512
91cf6b11d51167ec66e62097d379bebbcc8a094b6c4e38fa3bc91d9d64a7a1baf34fc5bfefee2c4077f4ff434c700b7a28f3b0ca3e4aed32d38a819bfdcee100
-
SSDEEP
24576:7EZoIhJSfkuGHOClz77HRLzz3R+9n+0AAXQjJOj31m/oTjUv:7YTuSzHxl+F+0bBj3MPv
Malware Config
Signatures
-
Detect Lumma Stealer payload V4 1 IoCs
resource yara_rule sample family_lumma_v4 -
Lumma family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Furion hack.dll
Files
-
Furion hack.dll.dll windows:6 windows x86 arch:x86
1f25fcc7a1bafe42b2d55b6bd5279064
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
K32GetMappedFileNameA
FreeLibraryAndExitThread
Sleep
VirtualQueryEx
SetPriorityClass
GetModuleHandleA
OpenProcess
GetLastError
DisableThreadLibraryCalls
CreateThread
GetCurrentProcessId
CreateDirectoryA
FormatMessageA
GlobalAlloc
GlobalLock
GlobalUnlock
MultiByteToWideChar
QueryPerformanceFrequency
QueryPerformanceCounter
MoveFileA
TerminateProcess
VirtualQuery
GetProcAddress
GetTickCount
FindFirstFileA
SetLastError
FindNextFileA
FindClose
GetFileAttributesA
DeleteFileA
SetFileAttributesA
RemoveDirectoryA
FlushInstructionCache
SetEndOfFile
WriteConsoleW
HeapSize
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
DeleteFileW
GetTimeZoneInformation
ReadConsoleW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
GetCurrentProcess
GetTimeFormatW
GetDateFormatW
GetConsoleMode
GetConsoleOutputCP
WriteFile
FlushFileBuffers
SetFilePointerEx
GetFileSizeEx
GetFileType
GetStdHandle
ReadFile
GetModuleHandleExW
ExitProcess
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
LoadLibraryExW
GetModuleFileNameW
InterlockedFlushSList
RtlUnwind
FreeLibrary
GetProcessHeap
InitializeSListHead
GetStartupInfoW
RaiseException
IsDebuggerPresent
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
CreateEventW
WaitForSingleObjectEx
ResetEvent
SetEvent
InitializeCriticalSectionAndSpinCount
GetCPInfo
GetSystemTimeAsFileTime
VirtualProtect
CompareStringW
GetModuleFileNameA
CloseHandle
HeapCreate
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
GetCurrentThreadId
OpenThread
SuspendThread
ResumeThread
GetThreadContext
SetThreadContext
GetModuleHandleW
CreateToolhelp32Snapshot
Thread32First
Thread32Next
VirtualAlloc
VirtualFree
LocalFree
GetLocaleInfoEx
CreateDirectoryW
CreateFileW
FindFirstFileW
FindFirstFileExW
FindNextFileW
GetFileAttributesExW
AreFileApisANSI
GetFileInformationByHandleEx
WideCharToMultiByte
GetStringTypeW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
LCMapStringEx
user32
SetWindowLongA
EnumWindows
IsWindowVisible
GetWindow
GetCursorPos
SetClipboardData
GetClipboardData
EmptyClipboard
CloseClipboard
OpenClipboard
CallWindowProcA
GetWindowThreadProcessId
GetKeyState
MessageBoxA
GetAsyncKeyState
SendMessageA
ShowCursor
shell32
ShellExecuteA
oleaut32
VariantClear
opengl32
glPolygonMode
glEnable
glLineWidth
glDisable
glDepthFunc
glFogi
glFogfv
glFogf
glClearColor
glClear
glGetIntegerv
glPushAttrib
glOrtho
glPixelStorei
glPushMatrix
glDrawElements
glColorPointer
glTexImage2D
glTexCoordPointer
glDeleteTextures
glTexParameteri
glLoadIdentity
glBlendFunc
glMatrixMode
glDisableClientState
glScissor
glVertexPointer
glGenTextures
glBindTexture
glPopAttrib
glEnableClientState
glViewport
glPopMatrix
imm32
ImmSetCompositionWindow
ImmGetContext
Sections
.text Size: 976KB - Virtual size: 976KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 343KB - Virtual size: 343KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 317KB - Virtual size: 765KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ