D:\ИСХОДНИКИ ФУРИОНА\Furion 1.795\Release\Furion hack.pdb
Behavioral task
behavioral1
Sample
Furion hack loader.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
Furion hack loader.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
Furion hack.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Furion hack.dll
Resource
win10v2004-20240412-en
General
-
Target
Furion hack 1.795 (1).rar
-
Size
824KB
-
MD5
e14dc6b28889f5d675ffb2ac9b93d3b7
-
SHA1
2783fee50bc963829e47a0ebf7f4f38f6c1b00a8
-
SHA256
d3d6f7f9f2b20a5b8e2517ea79f5a3bb48b7e13f7ec6533071dabdb8e0632569
-
SHA512
8107b5d6a3ec3beafce05830d5a15b3c5a486bffed60bdae284d81e7c2e40437a86cc8c4cdf5f2dddd7480edd11f94e8cda31df6d8fbb64c21c0b0a6e279eeed
-
SSDEEP
24576:IXtmIpHVV5xOBk7LGM1tNF5hCSzjm+LprLPM:Idf7WkPhr5z5hLk
Malware Config
Signatures
-
Detect Lumma Stealer payload V4 1 IoCs
resource yara_rule static1/unpack001/Furion hack.dll family_lumma_v4 -
Lumma family
-
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/Furion hack loader.exe unpack001/Furion hack.dll
Files
-
Furion hack 1.795 (1).rar.rar
-
Furion hack loader.exe.exe windows:6 windows x86 arch:x86
cb3a08b916b37aa7dc290c442a927ac9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
WaitForSingleObject
Sleep
GetCurrentProcessId
CreateRemoteThread
GetExitCodeThread
SuspendThread
ResumeThread
GetThreadContext
SetThreadContext
OpenProcess
GetVersionExA
WriteProcessMemory
GetModuleHandleA
GetProcAddress
LoadLibraryA
IsBadReadPtr
FindFirstFileA
GetLastError
CreateMutexA
CreateThread
GetModuleFileNameA
WriteConsoleW
CreateFileW
SetFilePointerEx
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
HeapReAlloc
HeapSize
GetProcessHeap
LCMapStringW
GetCurrentThreadId
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RaiseException
RtlUnwind
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
EncodePointer
GetStdHandle
WriteFile
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
HeapAlloc
HeapFree
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetFileType
GetStringTypeW
DecodePointer
user32
MessageBoxA
GetWindowRect
SetForegroundWindow
GetSystemMetrics
LoadIconA
DialogBoxParamA
IsWindowVisible
MoveWindow
ShowWindow
PostMessageA
SendMessageA
EndDialog
shell32
ShellExecuteA
Shell_NotifyIconA
Sections
.text Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.msvcjmc Size: 512B - Virtual size: 325B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 571KB - Virtual size: 571KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Furion hack.dll.dll windows:6 windows x86 arch:x86
1f25fcc7a1bafe42b2d55b6bd5279064
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
K32GetMappedFileNameA
FreeLibraryAndExitThread
Sleep
VirtualQueryEx
SetPriorityClass
GetModuleHandleA
OpenProcess
GetLastError
DisableThreadLibraryCalls
CreateThread
GetCurrentProcessId
CreateDirectoryA
FormatMessageA
GlobalAlloc
GlobalLock
GlobalUnlock
MultiByteToWideChar
QueryPerformanceFrequency
QueryPerformanceCounter
MoveFileA
TerminateProcess
VirtualQuery
GetProcAddress
GetTickCount
FindFirstFileA
SetLastError
FindNextFileA
FindClose
GetFileAttributesA
DeleteFileA
SetFileAttributesA
RemoveDirectoryA
FlushInstructionCache
SetEndOfFile
WriteConsoleW
HeapSize
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
DeleteFileW
GetTimeZoneInformation
ReadConsoleW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
GetCurrentProcess
GetTimeFormatW
GetDateFormatW
GetConsoleMode
GetConsoleOutputCP
WriteFile
FlushFileBuffers
SetFilePointerEx
GetFileSizeEx
GetFileType
GetStdHandle
ReadFile
GetModuleHandleExW
ExitProcess
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
LoadLibraryExW
GetModuleFileNameW
InterlockedFlushSList
RtlUnwind
FreeLibrary
GetProcessHeap
InitializeSListHead
GetStartupInfoW
RaiseException
IsDebuggerPresent
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
CreateEventW
WaitForSingleObjectEx
ResetEvent
SetEvent
InitializeCriticalSectionAndSpinCount
GetCPInfo
GetSystemTimeAsFileTime
VirtualProtect
CompareStringW
GetModuleFileNameA
CloseHandle
HeapCreate
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
GetCurrentThreadId
OpenThread
SuspendThread
ResumeThread
GetThreadContext
SetThreadContext
GetModuleHandleW
CreateToolhelp32Snapshot
Thread32First
Thread32Next
VirtualAlloc
VirtualFree
LocalFree
GetLocaleInfoEx
CreateDirectoryW
CreateFileW
FindFirstFileW
FindFirstFileExW
FindNextFileW
GetFileAttributesExW
AreFileApisANSI
GetFileInformationByHandleEx
WideCharToMultiByte
GetStringTypeW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
LCMapStringEx
user32
SetWindowLongA
EnumWindows
IsWindowVisible
GetWindow
GetCursorPos
SetClipboardData
GetClipboardData
EmptyClipboard
CloseClipboard
OpenClipboard
CallWindowProcA
GetWindowThreadProcessId
GetKeyState
MessageBoxA
GetAsyncKeyState
SendMessageA
ShowCursor
shell32
ShellExecuteA
oleaut32
VariantClear
opengl32
glPolygonMode
glEnable
glLineWidth
glDisable
glDepthFunc
glFogi
glFogfv
glFogf
glClearColor
glClear
glGetIntegerv
glPushAttrib
glOrtho
glPixelStorei
glPushMatrix
glDrawElements
glColorPointer
glTexImage2D
glTexCoordPointer
glDeleteTextures
glTexParameteri
glLoadIdentity
glBlendFunc
glMatrixMode
glDisableClientState
glScissor
glVertexPointer
glGenTextures
glBindTexture
glPopAttrib
glEnableClientState
glViewport
glPopMatrix
imm32
ImmSetCompositionWindow
ImmGetContext
Sections
.text Size: 976KB - Virtual size: 976KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 343KB - Virtual size: 343KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 317KB - Virtual size: 765KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ