Overview
overview
10Static
static
10Furk-Ultra...ss.bat
windows7-x64
7Furk-Ultra...ss.bat
windows10-2004-x64
8Furk-Ultra...ra.exe
windows7-x64
6Furk-Ultra...ra.exe
windows10-2004-x64
6Furk-Ultra...it.dll
windows7-x64
1Furk-Ultra...it.dll
windows10-2004-x64
1Furk-Ultra...on.dll
windows7-x64
1Furk-Ultra...on.dll
windows10-2004-x64
1Furk-Ultra... V2.js
windows7-x64
3Furk-Ultra... V2.js
windows10-2004-x64
3Furk-Ultra...ock.js
windows7-x64
3Furk-Ultra...ock.js
windows10-2004-x64
3Furk-Ultra...der.js
windows7-x64
3Furk-Ultra...der.js
windows10-2004-x64
3Furk-Ultra...ipt.js
windows7-x64
3Furk-Ultra...ipt.js
windows10-2004-x64
3Furk-Ultra...rer.js
windows7-x64
3Furk-Ultra...rer.js
windows10-2004-x64
3Furk-Ultra...Hub.js
windows7-x64
3Furk-Ultra...Hub.js
windows10-2004-x64
3Furk-Ultra...ass.js
windows7-x64
3Furk-Ultra...ass.js
windows10-2004-x64
3Furk-Ultra...ode.js
windows7-x64
3Furk-Ultra...ode.js
windows10-2004-x64
3Furk-Ultra...ce.dll
windows7-x64
1Furk-Ultra...ce.dll
windows10-2004-x64
1Furk-Ultra...ss.exe
windows7-x64
7Furk-Ultra...ss.exe
windows10-2004-x64
8Furk-Ultra...s1.exe
windows7-x64
7Furk-Ultra...s1.exe
windows10-2004-x64
7Furk-Ultra...er.dll
windows7-x64
3Furk-Ultra...er.dll
windows10-2004-x64
3Analysis
-
max time kernel
11s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
05-11-2024 04:46
Behavioral task
behavioral1
Sample
Furk-Ultra-main/Bypass.bat
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Furk-Ultra-main/Bypass.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Furk-Ultra-main/FurkUltra.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Furk-Ultra-main/FurkUltra.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Furk-Ultra-main/ICSharpCode.AvalonEdit.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Furk-Ultra-main/ICSharpCode.AvalonEdit.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Furk-Ultra-main/Newtonsoft.Json.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Furk-Ultra-main/Newtonsoft.Json.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Furk-Ultra-main/Scripts/Dex Explorer V2.js
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
Furk-Ultra-main/Scripts/Dex Explorer V2.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Furk-Ultra-main/Scripts/FPS Aimlock.js
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
Furk-Ultra-main/Scripts/FPS Aimlock.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Furk-Ultra-main/Scripts/Hitbox Extender.js
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Furk-Ultra-main/Scripts/Hitbox Extender.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Furk-Ultra-main/Scripts/Kick Off Script.js
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
Furk-Ultra-main/Scripts/Kick Off Script.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Furk-Ultra-main/Scripts/Old DEX Explorer.js
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
Furk-Ultra-main/Scripts/Old DEX Explorer.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Furk-Ultra-main/Scripts/TopKek ScriptHub.js
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Furk-Ultra-main/Scripts/TopKek ScriptHub.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Furk-Ultra-main/Scripts/[FE] Chat Bypass.js
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Furk-Ultra-main/Scripts/[FE] Chat Bypass.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Furk-Ultra-main/Scripts/[FE] God Mode.js
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Furk-Ultra-main/Scripts/[FE] God Mode.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Furk-Ultra-main/System.Diagnostics.DiagnosticSource.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
Furk-Ultra-main/System.Diagnostics.DiagnosticSource.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Furk-Ultra-main/bin/Bypass.exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
Furk-Ultra-main/bin/Bypass.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Furk-Ultra-main/bin/Bypass1.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Furk-Ultra-main/bin/Bypass1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Furk-Ultra-main/bin/Helper.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
Furk-Ultra-main/bin/Helper.dll
Resource
win10v2004-20241007-en
General
-
Target
Furk-Ultra-main/bin/Bypass.exe
-
Size
7.3MB
-
MD5
b6fc4bbdbae0300b3c1fd00dccbcfe78
-
SHA1
2e14e298c29b2c79cf78a575a79f4488e85a0dd8
-
SHA256
99935b77b6c7387bb1d572704dd96e804d0a7655e2197afeab8baacc1ad9d067
-
SHA512
02bbacd3cd3d23f7eab4a33901eabeac6f706140e98835e916c97fb995cd747ac7c09494fcf9a90d0e92c5bc6a43123bfc32dcf88b7e1b5c713cfc7ff3ec9c15
-
SSDEEP
196608:VuhYS6qOshoKMuIkhVastRL5Di3uq1D7mo:QYSjOshouIkPftRL54DRN
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
Bypass.exepid process 2868 Bypass.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\_MEI21722\python311.dll upx -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Bypass.exedescription pid process target process PID 2172 wrote to memory of 2868 2172 Bypass.exe Bypass.exe PID 2172 wrote to memory of 2868 2172 Bypass.exe Bypass.exe PID 2172 wrote to memory of 2868 2172 Bypass.exe Bypass.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Furk-Ultra-main\bin\Bypass.exe"C:\Users\Admin\AppData\Local\Temp\Furk-Ultra-main\bin\Bypass.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\Furk-Ultra-main\bin\Bypass.exe"C:\Users\Admin\AppData\Local\Temp\Furk-Ultra-main\bin\Bypass.exe"2⤵
- Loads dropped DLL
PID:2868
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD55f6fd64ec2d7d73ae49c34dd12cedb23
SHA1c6e0385a868f3153a6e8879527749db52dce4125
SHA256ff9f102264d1944fbfae2ba70e7a71435f51a3e8c677fd970b621c4c9ea71967
SHA512c4be2d042c6e4d22e46eacfd550f61b8f55814bfe41d216a4df48382247df70bc63151068513855aa78f9b3d2f10ba6a824312948324c92de6dd0f6af414e8ab