File name:

Elektrus.zip

Full analysis: https://app.any.run/tasks/becb4152-ee51-402e-a505-72084d116594
Verdict: Malicious activity
Threats:

Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat.

Analysis date: April 21, 2025, 11:58:56
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
autoit
lumma
stealer
autoit-loader
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

B3D6CECC7451F5A602598699E842989C

SHA1:

C138200CCA359A8731600B503498489AFF39AB57

SHA256:

524A7AEE21F0C3F3B2CBA3377DBBD519B8C9D91F99B6E27AD24A2E62EE991716

SSDEEP:

49152:2kvvIQjx8PzUYO2COz9L338n0EOFz/Hd8f9vJwCbvQLOqepDzDRy1yAiDt9qPyMX:JvvpgzUYjJ53kNY98f1WCDqedk1yfh9K

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 4452)
    • LUMMA mutex has been found

      • Instantly.com (PID: 4740)
    • AutoIt loader has been detected (YARA)

      • Instantly.com (PID: 4740)
    • LUMMA has been detected (SURICATA)

      • svchost.exe (PID: 2196)
      • Instantly.com (PID: 4740)
    • Connects to the CnC server

      • svchost.exe (PID: 2196)
    • Steals credentials from Web Browsers

      • Instantly.com (PID: 4740)
    • Actions looks like stealing of personal data

      • Instantly.com (PID: 4740)
      • Instantly.com (PID: 4740)
    • Executing a file with an untrusted certificate

      • Elektrus.exe (PID: 5548)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • Elektrus.exe (PID: 5548)
    • Executing commands from a ".bat" file

      • Elektrus.exe (PID: 5548)
    • Starts CMD.EXE for commands execution

      • Elektrus.exe (PID: 5548)
      • cmd.exe (PID: 896)
    • Get information on the list of running processes

      • cmd.exe (PID: 896)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 896)
    • Application launched itself

      • cmd.exe (PID: 896)
    • Starts application with an unusual extension

      • cmd.exe (PID: 896)
    • Starts the AutoIt3 executable file

      • cmd.exe (PID: 896)
    • The executable file from the user directory is run by the CMD process

      • Instantly.com (PID: 4740)
    • There is functionality for taking screenshot (YARA)

      • Instantly.com (PID: 4740)
    • Contacting a server suspected of hosting an CnC

      • svchost.exe (PID: 2196)
      • Instantly.com (PID: 4740)
    • Searches for installed software

      • Instantly.com (PID: 4740)
  • INFO

    • Manual execution by a user

      • Elektrus.exe (PID: 5548)
    • Reads the software policy settings

      • slui.exe (PID: 6044)
      • Instantly.com (PID: 4740)
      • slui.exe (PID: 4692)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 4452)
    • Checks supported languages

      • Elektrus.exe (PID: 5548)
      • extrac32.exe (PID: 856)
      • Instantly.com (PID: 4740)
    • Reads the computer name

      • Elektrus.exe (PID: 5548)
      • extrac32.exe (PID: 856)
      • Instantly.com (PID: 4740)
    • Create files in a temporary directory

      • Elektrus.exe (PID: 5548)
      • extrac32.exe (PID: 856)
    • Creates a new folder

      • cmd.exe (PID: 1568)
    • Reads mouse settings

      • Instantly.com (PID: 4740)
    • Process checks computer location settings

      • Elektrus.exe (PID: 5548)
    • Checks proxy server information

      • slui.exe (PID: 4692)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2025:04:20 09:17:34
ZipCRC: 0xbea23c0a
ZipCompressedSize: 1195570
ZipUncompressedSize: 1247427
ZipFileName: Elektrus.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
147
Monitored processes
19
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe sppextcomobj.exe no specs slui.exe slui.exe elektrus.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs extrac32.exe no specs findstr.exe no specs cmd.exe no specs cmd.exe no specs #LUMMA instantly.com choice.exe no specs #LUMMA svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
300cmd /c copy /b 772673\Instantly.com + Tutorials + Extremely + Hawaii + Catering + Spot + Au + Females + Pat + Ideal 772673\Instantly.comC:\Windows\SysWOW64\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
856extrac32 /Y /E Toe.ppsxC:\Windows\SysWOW64\extrac32.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft® CAB File Extract Utility
Exit code:
0
Version:
5.00 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\extrac32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
896"C:\WINDOWS\System32\cmd.exe" /c copy Webshots.ppsx Webshots.ppsx.bat & Webshots.ppsx.batC:\Windows\SysWOW64\cmd.exeElektrus.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
1132findstr /I "opssvc wrsa" C:\Windows\SysWOW64\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (QGREP) Utility
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
1184findstr /V "Elegant" Detailed C:\Windows\SysWOW64\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (QGREP) Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
1568cmd /c md 772673C:\Windows\SysWOW64\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
3180cmd /c copy /b ..\Infectious.ppsx + ..\Diving.ppsx + ..\Ends.ppsx + ..\Elections.ppsx + ..\Else.ppsx + ..\Clinic.ppsx + ..\Prepaid.ppsx + ..\Vice.ppsx z C:\Windows\SysWOW64\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
4268C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
4452"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\Elektrus.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
Total events
3 140
Read events
3 122
Write events
18
Delete events
0

Modification events

(PID) Process:(4452) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(4452) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(4452) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(4452) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\Elektrus.zip
(PID) Process:(4452) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(4452) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(4452) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(4452) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(4452) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF3D0000002D000000FD03000016020000
(PID) Process:(4452) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths
Operation:writeName:name
Value:
256
Executable files
1
Suspicious files
19
Text files
3
Unknown types
1

Dropped files

PID
Process
Filename
Type
5548Elektrus.exeC:\Users\admin\AppData\Local\Temp\Vice.ppsxbinary
MD5:068D311ACF1AC94F58CCE95B2516B9C8
SHA256:2CFA98E5EB99C7DB7E6A896856F73E5AA2D65484422ADAABD2178EB2131030B4
5548Elektrus.exeC:\Users\admin\AppData\Local\Temp\Infectious.ppsxbinary
MD5:8E4B104061CBB164D23FBBF80DFD2FBA
SHA256:9AE6A4E46B31D9FE4EE248A394560255FE2A8B523F0A8A17F27442C69EC7B323
5548Elektrus.exeC:\Users\admin\AppData\Local\Temp\Diving.ppsxbinary
MD5:3E420E212054DF37041240C03DE5A658
SHA256:F81A7214E3BE811D175720002CC2851446CA09CBE2592394B77C70ECA98E4BDA
896cmd.exeC:\Users\admin\AppData\Local\Temp\Webshots.ppsx.battext
MD5:4BE2BC83969841071C0CCEE852A2FD6E
SHA256:CD2673270F49D550A644D085235B4C0C9E8F90EFC32233088E12650F8814592F
5548Elektrus.exeC:\Users\admin\AppData\Local\Temp\Webshots.ppsxtext
MD5:4BE2BC83969841071C0CCEE852A2FD6E
SHA256:CD2673270F49D550A644D085235B4C0C9E8F90EFC32233088E12650F8814592F
5548Elektrus.exeC:\Users\admin\AppData\Local\Temp\Prepaid.ppsxbinary
MD5:D411AE73E8B22453FE9306F30C5F3B98
SHA256:5BB11E1304071D29F3973E7837C6491650D6C44AFFE31B9261F19154D0D33E20
5548Elektrus.exeC:\Users\admin\AppData\Local\Temp\Ends.ppsxbinary
MD5:EB225AFCFC0697A14192351F7C30C14E
SHA256:CE01390CC12105FEF4958F26AAB0D4B4B07A5A70C890F8FD196415F530FDD9AE
5548Elektrus.exeC:\Users\admin\AppData\Local\Temp\Elections.ppsxbinary
MD5:819A1AE350FCA23FD6BAAAE2090CA78E
SHA256:F90AC9466619A729A19642EF56F35023F99E8FBA65A02ADF7ED691712E36FD34
856extrac32.exeC:\Users\admin\AppData\Local\Temp\Cateringbinary
MD5:6F614150C55AD39C850FBB4787D113D0
SHA256:7589959320EBF3DD98A928A821BFFB85E948A22FE6217F143B60DB9316E973A2
5548Elektrus.exeC:\Users\admin\AppData\Local\Temp\Else.ppsxbinary
MD5:5C0EC9ACDDFB1AFD2E8846736AD3C34E
SHA256:D99229DB0DE8AFA599BE8731B2C178679B2E82FC05F063899CD65FE5056FD235
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
19
DNS requests
9
Threats
9

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
104.83.4.146:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
92.123.37.9:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2104
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
104.83.4.146:80
crl.microsoft.com
Akamai International B.V.
AT
whitelisted
92.123.37.9:80
www.microsoft.com
AKAMAI-AS
AT
whitelisted
4
System
192.168.100.255:138
whitelisted
2112
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6044
slui.exe
40.91.76.224:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4740
Instantly.com
104.21.85.126:443
clarmodq.top
CLOUDFLARENET
malicious

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 4.231.128.59
whitelisted
crl.microsoft.com
  • 104.83.4.146
whitelisted
google.com
  • 142.251.36.238
whitelisted
www.microsoft.com
  • 92.123.37.9
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted
hCJfNGJjNAnmyVkXDJjNZ.hCJfNGJjNAnmyVkXDJjNZ
unknown
clarmodq.top
  • 104.21.85.126
malicious
self.events.data.microsoft.com
  • 52.178.17.2
whitelisted

Threats

PID
Process
Class
Message
2196
svchost.exe
Potentially Bad Traffic
ET DNS Query to a *.top domain - Likely Hostile
2196
svchost.exe
A Network Trojan was detected
MALWARE [ANY.RUN] Suspected Domain Associated with Malware Distribution (clarmodq .top)
2196
svchost.exe
Domain Observed Used for C2 Detected
ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (clarmodq .top)
4740
Instantly.com
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (clarmodq .top in TLS SNI)
4740
Instantly.com
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (clarmodq .top in TLS SNI)
4740
Instantly.com
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (clarmodq .top in TLS SNI)
4740
Instantly.com
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (clarmodq .top in TLS SNI)
4740
Instantly.com
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (clarmodq .top in TLS SNI)
4740
Instantly.com
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (clarmodq .top in TLS SNI)
No debug info