| File name: | SecuriteInfo.com.Variant.Mikey.154420.4177.25356 |
| Full analysis: | https://app.any.run/tasks/b4c56b34-e27c-419c-8820-fd7d24c5bd9c |
| Verdict: | Malicious activity |
| Threats: | Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat. |
| Analysis date: | October 08, 2023, 09:22:20 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (console) Intel 80386, for MS Windows |
| MD5: | D466BDA2F8C5F5FB0595547E5A97D843 |
| SHA1: | F245EC07D53FBC3A9EE1309A006CAC099A8548CF |
| SHA256: | 09BCFEF16EBDB6EB335B71EC950E173C7488C0B071E7AD217EF66ACF1E9BC5A9 |
| SSDEEP: | 49152:T/xN9g9QI1AyJbRcimFNCi1JKahArOAkqkAvbwF+rQ:T/xNC9QI1PVRcBNCssahAiAR |
| .exe | | | Win32 Executable MS Visual C++ (generic) (42.2) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (37.3) |
| .dll | | | Win32 Dynamic Link Library (generic) (8.8) |
| .exe | | | Win32 Executable (generic) (6) |
| .exe | | | Generic Win/DOS Executable (2.7) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2023:10:07 22:59:12+02:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 14.34 |
| CodeSize: | 774144 |
| InitializedDataSize: | 1482752 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x1212 |
| OSVersion: | 6 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows command line |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2280 | "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe | SecuriteInfo.com.Variant.Mikey.154420.4177.25356.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft .NET ClickOnce Launch Utility Exit code: 0 Version: 4.7.2558.0 built by: NET471REL1 Modules
| |||||||||||||||
| 2896 | "C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Mikey.154420.4177.25356.exe" | C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Mikey.154420.4177.25356.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
Lumma(PID) Process(2896) SecuriteInfo.com.Variant.Mikey.154420.4177.25356.exe C2 (2)teleportfilmona.online tipsydulljaui.website Options LummaIDkEyJAI--VIGOR | |||||||||||||||
| (PID) Process: | (2280) AppLaunch.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (2280) AppLaunch.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (2280) AppLaunch.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | write | Name: | ProxyEnable |
Value: 0 | |||
| (PID) Process: | (2280) AppLaunch.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections |
| Operation: | write | Name: | SavedLegacySettings |
Value: 46000000BD000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (2280) AppLaunch.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (2280) AppLaunch.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (2280) AppLaunch.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (2280) AppLaunch.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2280 | AppLaunch.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\MICM7F87.txt | text | |
MD5:2F091B9217CEEF414D82067990FB7DA6 | SHA256:B455DEDCBEEC5BCA021CA738BD64475D2373960F15CB9523238FAB6C321EE40E | |||
| 2280 | AppLaunch.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\J28XLDT8.txt | text | |
MD5:EC3E34EBC3F6476F44C33E80A9D6A55A | SHA256:BC59CDB8BE240C013ABD8CEB228E81F2B45C62D857621FE78512A90B439D2C79 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2280 | AppLaunch.exe | GET | 403 | 172.67.161.64:80 | http://tipsydulljaui.website/ | unknown | html | 4.19 Kb | unknown |
2280 | AppLaunch.exe | POST | 200 | 172.67.161.64:80 | http://tipsydulljaui.website/api | unknown | text | 2 b | unknown |
2280 | AppLaunch.exe | POST | 200 | 172.67.161.64:80 | http://tipsydulljaui.website/api | unknown | text | 16.1 Kb | unknown |
2280 | AppLaunch.exe | POST | 200 | 172.67.161.64:80 | http://tipsydulljaui.website/api | unknown | text | 2 b | unknown |
2280 | AppLaunch.exe | POST | 200 | 172.67.161.64:80 | http://tipsydulljaui.website/api | unknown | text | 2 b | unknown |
2280 | AppLaunch.exe | POST | 200 | 172.67.161.64:80 | http://tipsydulljaui.website/api | unknown | text | 2 b | unknown |
2280 | AppLaunch.exe | POST | 200 | 172.67.161.64:80 | http://tipsydulljaui.website/api | unknown | text | 2 b | unknown |
2280 | AppLaunch.exe | POST | 200 | 172.67.161.64:80 | http://tipsydulljaui.website/api | unknown | text | 2 b | unknown |
2280 | AppLaunch.exe | POST | 200 | 172.67.161.64:80 | http://tipsydulljaui.website/api | unknown | text | 2 b | unknown |
2280 | AppLaunch.exe | POST | 200 | 172.67.161.64:80 | http://tipsydulljaui.website/api | unknown | text | 2 b | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
1956 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | unknown |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
324 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
2280 | AppLaunch.exe | 172.67.161.64:80 | tipsydulljaui.website | CLOUDFLARENET | US | unknown |
Domain | IP | Reputation |
|---|---|---|
tipsydulljaui.website |
| malicious |
PID | Process | Class | Message |
|---|---|---|---|
2280 | AppLaunch.exe | Malware Command and Control Activity Detected | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Check-In |
2280 | AppLaunch.exe | Malware Command and Control Activity Detected | STEALER [ANY.RUN] Win32/Lumma Stealer Check-In |
2280 | AppLaunch.exe | Malware Command and Control Activity Detected | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration |
2280 | AppLaunch.exe | Malware Command and Control Activity Detected | STEALER [ANY.RUN] Win32/Lumma Stealer Exfiltration |
2280 | AppLaunch.exe | Malware Command and Control Activity Detected | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration |
2280 | AppLaunch.exe | Malware Command and Control Activity Detected | STEALER [ANY.RUN] Win32/Lumma Stealer Exfiltration |