File name:

Setup.exe

Full analysis: https://app.any.run/tasks/9533206f-54e1-4fff-8d4c-62faeca63bf1
Verdict: Malicious activity
Threats:

Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat.

Analysis date: September 11, 2024, 16:24:47
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
lumma
stealer
crypto-regex
Indicators:
MIME: application/x-dosexec
File info: PE32+ executable (GUI) x86-64, for MS Windows
MD5:

AD2735F096925010A53450CB4178C89E

SHA1:

C6D65163C6315A642664F4EAEC0FAE9528549BFE

SHA256:

4E775B5FAFB4E6D89A4694F8694D2B8B540534BD4A52FF42F70095F1C929160E

SSDEEP:

98304:i1DIdhM4/FRL+lnkENnPRPrmImRTlsjR1+8O4hhySd/W83WD3wCyGgd0lprVpXXp:i1DPdJnho

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • RelishKitchen.a3x (PID: 4080)
    • Stealers network behavior

      • RelishKitchen.a3x (PID: 4080)
    • Connects to the CnC server

      • svchost.exe (PID: 2256)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 2520)
    • LUMMA has been detected (YARA)

      • RelishKitchen.a3x (PID: 4080)
    • LUMMA has been detected (SURICATA)

      • RelishKitchen.a3x (PID: 4080)
      • svchost.exe (PID: 2256)
    • Changes powershell execution policy (Bypass)

      • RelishKitchen.a3x (PID: 4080)
    • Changes the autorun value in the registry

      • reg.exe (PID: 1156)
    • Uses Task Scheduler to run other applications

      • cmd.exe (PID: 5160)
    • Probably downloads file via BitsAdmin (POWERSHELL)

      • powershell.exe (PID: 2520)
  • SUSPICIOUS

    • The process drops C-runtime libraries

      • Setup.exe (PID: 5112)
    • Starts application with an unusual extension

      • Setup.exe (PID: 5112)
      • more.com (PID: 6140)
    • Process drops legitimate windows executable

      • Setup.exe (PID: 5112)
    • Executable content was dropped or overwritten

      • Setup.exe (PID: 5112)
      • more.com (PID: 6140)
      • RelishKitchen.a3x (PID: 4080)
      • EX7PRD39SOBEO0NUL0A5.exe (PID: 4576)
    • Contacting a server suspected of hosting an CnC

      • svchost.exe (PID: 2256)
      • RelishKitchen.a3x (PID: 4080)
    • Starts POWERSHELL.EXE for commands execution

      • RelishKitchen.a3x (PID: 4080)
    • The process executes Powershell scripts

      • RelishKitchen.a3x (PID: 4080)
    • Gets or sets the security protocol (POWERSHELL)

      • powershell.exe (PID: 2520)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 2572)
    • Extracts files to a directory (POWERSHELL)

      • powershell.exe (PID: 2520)
    • The process executes via Task Scheduler

      • 514D3030303031.exe (PID: 6816)
    • Found regular expressions for crypto-addresses (YARA)

      • 514D3030303031.exe (PID: 6816)
    • Starts CMD.EXE for commands execution

      • EX7PRD39SOBEO0NUL0A5.exe (PID: 4576)
  • INFO

    • Checks supported languages

      • Setup.exe (PID: 5112)
      • more.com (PID: 6140)
      • RelishKitchen.a3x (PID: 4080)
      • OVM9HNUXBV8CF8Z2SQGJP78S2S.exe (PID: 6356)
      • EX7PRD39SOBEO0NUL0A5.exe (PID: 4576)
      • 514D3030303031.exe (PID: 6816)
    • Manual execution by a user

      • Setup.exe (PID: 5112)
    • Reads the computer name

      • Setup.exe (PID: 5112)
      • more.com (PID: 6140)
      • RelishKitchen.a3x (PID: 4080)
      • OVM9HNUXBV8CF8Z2SQGJP78S2S.exe (PID: 6356)
      • EX7PRD39SOBEO0NUL0A5.exe (PID: 4576)
      • 514D3030303031.exe (PID: 6816)
    • Creates files or folders in the user directory

      • Setup.exe (PID: 5112)
    • Create files in a temporary directory

      • Setup.exe (PID: 5112)
      • more.com (PID: 6140)
      • RelishKitchen.a3x (PID: 4080)
      • OVM9HNUXBV8CF8Z2SQGJP78S2S.exe (PID: 6356)
    • Reads the software policy settings

      • RelishKitchen.a3x (PID: 4080)
      • 514D3030303031.exe (PID: 6816)
    • Creates files in the program directory

      • EX7PRD39SOBEO0NUL0A5.exe (PID: 4576)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 2520)
    • Reads the machine GUID from the registry

      • 514D3030303031.exe (PID: 6816)
    • The process uses the downloaded file

      • powershell.exe (PID: 2520)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 2520)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2024:03:22 10:26:52+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.37
CodeSize: 3617792
InitializedDataSize: 2067968
UninitializedDataSize: -
EntryPoint: 0x240ca8
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 13.162.0.5675
ProductVersionNumber: 13.162.0.5675
FileFlagsMask: 0x003f
FileFlags: Debug
FileOS: Windows NT 32-bit
ObjectFileType: Static library
FileSubtype: -
LanguageCode: English (Canadian)
CharacterSet: Unicode
CompanyName: Electronic Arts
FileDescription: EA
FileVersion: 13, 162, 0, 5675
InternalName: EA
LegalCopyright: Copyright (c) 2024
LegalTrademarks: (c) Electronic Arts 2024. All rights reserved.
OriginalFileName: EASteamProxy.exe
ProductName: EA
ProductVersion: 13, 162, 0, 5675
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
141
Monitored processes
18
Malicious processes
6
Suspicious processes
2

Behavior graph

Click at the process to see the details
start setup.exe no specs rundll32.exe no specs setup.exe more.com conhost.exe no specs #LUMMA relishkitchen.a3x #LUMMA svchost.exe ex7prd39sobeo0nul0a5.exe ovm9hnuxbv8cf8z2sqgjp78s2s.exe no specs powershell.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs reg.exe THREAT 514d3030303031.exe

Process information

PID
CMD
Path
Indicators
Parent process
320\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1156reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v 514D3030303031 /t REG_SZ /d C:\ProgramData\514D3030303031.exe /fC:\Windows\SysWOW64\reg.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\advapi32.dll
2256C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2520powershell -exec bypass -f "C:\Users\admin\AppData\Local\Temp\L73YKL359GOETH2ZC.ps1"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRelishKitchen.a3x
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\oleaut32.dll
2572cmd /c "reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v 514D3030303031 /t REG_SZ /d C:\ProgramData\514D3030303031.exe /f"C:\Windows\SysWOW64\cmd.exeEX7PRD39SOBEO0NUL0A5.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
2588\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exemore.com
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3296C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
3852\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4080C:\Users\admin\AppData\Local\Temp\RelishKitchen.a3xC:\Users\admin\AppData\Local\Temp\RelishKitchen.a3x
more.com
User:
admin
Company:
AutoIt Team
Integrity Level:
MEDIUM
Description:
AutoIt v3 Script (Beta)
Exit code:
0
Version:
3, 3, 15, 1
Modules
Images
c:\users\admin\appdata\local\temp\vfhsubgymo
c:\users\admin\appdata\local\temp\relishkitchen.a3x
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\user32.dll
4576"C:\Users\admin\AppData\Local\Temp\EX7PRD39SOBEO0NUL0A5.exe"C:\Users\admin\AppData\Local\Temp\EX7PRD39SOBEO0NUL0A5.exe
RelishKitchen.a3x
User:
admin
Company:
Яндекс
Integrity Level:
MEDIUM
Description:
YandexDiskSetup
Exit code:
0
Version:
3.2.41.5053
Modules
Images
c:\users\admin\appdata\local\temp\ex7prd39sobeo0nul0a5.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\wldap32.dll
c:\windows\syswow64\ucrtbase.dll
Total events
12 046
Read events
12 044
Write events
2
Delete events
0

Modification events

(PID) Process:(1156) reg.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:514D3030303031
Value:
C:\ProgramData\514D3030303031.exe
(PID) Process:(2520) powershell.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:InternetFilesCache
Value:
C:\Users\admin\AppData\Roaming\InternetFilesCache\client32.exe
Executable files
13
Suspicious files
4
Text files
8
Unknown types
0

Dropped files

PID
Process
Filename
Type
6140more.comC:\Users\admin\AppData\Local\Temp\vfhsubgymo
MD5:
SHA256:
5112Setup.exeC:\Users\admin\AppData\Roaming\MonWri\msvcp140.dllexecutable
MD5:1BA6D1CF0508775096F9E121A24E5863
SHA256:74892D9B4028C05DEBAF0B9B5D9DC6D22F7956FA7D7EEE00C681318C26792823
4080RelishKitchen.a3xC:\Users\admin\AppData\Local\Temp\OVM9HNUXBV8CF8Z2SQGJP78S2S.exeexecutable
MD5:7F41FE3E70E6068B9C13C3C8738A8364
SHA256:73AAC3C537761E667A5DE139F90D5D99CDDE0E153E5C6370DA81E385BC7D46D6
6140more.comC:\Users\admin\AppData\Local\Temp\RelishKitchen.a3xexecutable
MD5:3F58A517F1F4796225137E7659AD2ADB
SHA256:1DA298CAB4D537B0B7B5DABF09BFF6A212B9E45731E0CC772F99026005FB9E48
5112Setup.exeC:\Users\admin\AppData\Roaming\MonWri\bftrejebinary
MD5:06595F2F61FB806816D2A9CAC2EEE729
SHA256:AF67EC2868D62CCA10FC3E13DEFFB43849DA77F2FB1D99E40CE23B5472710DA7
2520powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_kaen2fjy.w3z.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
5112Setup.exeC:\Users\admin\AppData\Roaming\MonWri\qttisobinary
MD5:DD43BEDDF15617D880B65976798B00F5
SHA256:1D73A3A14562CB043253B568AB9B162584BE7920D18B24DD5B3240AAA9781AB8
2520powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_djmx5i3v.0xq.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
6356OVM9HNUXBV8CF8Z2SQGJP78S2S.exeC:\Users\admin\AppData\Local\Temp\1817406dimage
MD5:722B827462E2F3074B693BB0DF4E4C61
SHA256:AEB3D1748FE14667B9A847B3D08B9FC86CD831B3F56C90010C6AB1974CE76512
2520powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_2rsg1zge.okw.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
36
DNS requests
21
Threats
10

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2120
MoUsoCoreWorker.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1280
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1812
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1812
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
568
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
6124
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2120
MoUsoCoreWorker.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
3888
svchost.exe
239.255.255.250:1900
whitelisted
3260
svchost.exe
40.113.110.67:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1280
svchost.exe
40.126.31.71:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1280
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
568
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 40.127.240.158
whitelisted
www.microsoft.com
  • 88.221.169.152
  • 184.30.21.171
whitelisted
google.com
  • 216.58.206.46
whitelisted
client.wns.windows.com
  • 40.113.110.67
  • 20.7.1.246
whitelisted
login.live.com
  • 40.126.31.71
  • 40.126.31.73
  • 20.190.159.4
  • 20.190.159.68
  • 20.190.159.73
  • 20.190.159.64
  • 40.126.31.69
  • 20.190.159.2
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
slscr.update.microsoft.com
  • 40.127.169.103
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted
weakkysemwmns.shop
malicious
preachstrwnwjw.shop
  • 188.114.96.3
  • 188.114.97.3
malicious

Threats

PID
Process
Class
Message
2256
svchost.exe
Domain Observed Used for C2 Detected
ET MALWARE Lumma Stealer Related CnC Domain in DNS Lookup (preachstrwnwjw .shop)
4080
RelishKitchen.a3x
A Network Trojan was detected
STEALER [ANY.RUN] Lumma Stealer TLS Connection
4080
RelishKitchen.a3x
Domain Observed Used for C2 Detected
ET MALWARE Observed Lumma Stealer Related Domain (preachstrwnwjw .shop in TLS SNI)
4080
RelishKitchen.a3x
Domain Observed Used for C2 Detected
ET MALWARE Observed Lumma Stealer Related Domain (preachstrwnwjw .shop in TLS SNI)
4080
RelishKitchen.a3x
Domain Observed Used for C2 Detected
ET MALWARE Observed Lumma Stealer Related Domain (preachstrwnwjw .shop in TLS SNI)
4080
RelishKitchen.a3x
Domain Observed Used for C2 Detected
ET MALWARE Observed Lumma Stealer Related Domain (preachstrwnwjw .shop in TLS SNI)
4080
RelishKitchen.a3x
Domain Observed Used for C2 Detected
ET MALWARE Observed Lumma Stealer Related Domain (preachstrwnwjw .shop in TLS SNI)
4080
RelishKitchen.a3x
Domain Observed Used for C2 Detected
ET MALWARE Observed Lumma Stealer Related Domain (preachstrwnwjw .shop in TLS SNI)
2256
svchost.exe
Misc activity
ET INFO Pastebin Service Domain in DNS Lookup (rentry .co)
4080
RelishKitchen.a3x
Misc activity
ET INFO Observed Pastebin Service Domain (rentry .co in TLS SNI)
No debug info