| File name: | Elektrus.zip |
| Full analysis: | https://app.any.run/tasks/becb4152-ee51-402e-a505-72084d116594 |
| Verdict: | Malicious activity |
| Threats: | Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat. |
| Analysis date: | April 21, 2025, 11:58:56 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/zip |
| File info: | Zip archive data, at least v2.0 to extract, compression method=deflate |
| MD5: | B3D6CECC7451F5A602598699E842989C |
| SHA1: | C138200CCA359A8731600B503498489AFF39AB57 |
| SHA256: | 524A7AEE21F0C3F3B2CBA3377DBBD519B8C9D91F99B6E27AD24A2E62EE991716 |
| SSDEEP: | 49152:2kvvIQjx8PzUYO2COz9L338n0EOFz/Hd8f9vJwCbvQLOqepDzDRy1yAiDt9qPyMX:JvvpgzUYjJ53kNY98f1WCDqedk1yfh9K |
| .zip | | | ZIP compressed archive (100) |
|---|
| ZipRequiredVersion: | 20 |
|---|---|
| ZipBitFlag: | - |
| ZipCompression: | Deflated |
| ZipModifyDate: | 2025:04:20 09:17:34 |
| ZipCRC: | 0xbea23c0a |
| ZipCompressedSize: | 1195570 |
| ZipUncompressedSize: | 1247427 |
| ZipFileName: | Elektrus.exe |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 300 | cmd /c copy /b 772673\Instantly.com + Tutorials + Extremely + Hawaii + Catering + Spot + Au + Females + Pat + Ideal 772673\Instantly.com | C:\Windows\SysWOW64\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 856 | extrac32 /Y /E Toe.ppsx | C:\Windows\SysWOW64\extrac32.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft® CAB File Extract Utility Exit code: 0 Version: 5.00 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 896 | "C:\WINDOWS\System32\cmd.exe" /c copy Webshots.ppsx Webshots.ppsx.bat & Webshots.ppsx.bat | C:\Windows\SysWOW64\cmd.exe | — | Elektrus.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 1 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1132 | findstr /I "opssvc wrsa" | C:\Windows\SysWOW64\findstr.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Find String (QGREP) Utility Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1184 | findstr /V "Elegant" Detailed | C:\Windows\SysWOW64\findstr.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Find String (QGREP) Utility Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1568 | cmd /c md 772673 | C:\Windows\SysWOW64\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2196 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3180 | cmd /c copy /b ..\Infectious.ppsx + ..\Diving.ppsx + ..\Ends.ppsx + ..\Elections.ppsx + ..\Else.ppsx + ..\Clinic.ppsx + ..\Prepaid.ppsx + ..\Vice.ppsx z | C:\Windows\SysWOW64\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4268 | C:\WINDOWS\system32\SppExtComObj.exe -Embedding | C:\Windows\System32\SppExtComObj.Exe | — | svchost.exe | |||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: KMS Connection Broker Exit code: 0 Version: 10.0.19041.3996 (WinBuild.160101.0800) | |||||||||||||||
| 4452 | "C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\Elektrus.zip | C:\Program Files\WinRAR\WinRAR.exe | explorer.exe | ||||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Exit code: 0 Version: 5.91.0 Modules
| |||||||||||||||
| (PID) Process: | (4452) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 3 |
Value: C:\Users\admin\Desktop\preferences.zip | |||
| (PID) Process: | (4452) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\chromium_ext.zip | |||
| (PID) Process: | (4452) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\omni_23_10_2024_.zip | |||
| (PID) Process: | (4452) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\Desktop\Elektrus.zip | |||
| (PID) Process: | (4452) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (4452) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (4452) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (4452) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (4452) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\MainWin |
| Operation: | write | Name: | Placement |
Value: 2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF3D0000002D000000FD03000016020000 | |||
| (PID) Process: | (4452) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths |
| Operation: | write | Name: | name |
Value: 256 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 5548 | Elektrus.exe | C:\Users\admin\AppData\Local\Temp\Vice.ppsx | binary | |
MD5:068D311ACF1AC94F58CCE95B2516B9C8 | SHA256:2CFA98E5EB99C7DB7E6A896856F73E5AA2D65484422ADAABD2178EB2131030B4 | |||
| 5548 | Elektrus.exe | C:\Users\admin\AppData\Local\Temp\Infectious.ppsx | binary | |
MD5:8E4B104061CBB164D23FBBF80DFD2FBA | SHA256:9AE6A4E46B31D9FE4EE248A394560255FE2A8B523F0A8A17F27442C69EC7B323 | |||
| 5548 | Elektrus.exe | C:\Users\admin\AppData\Local\Temp\Diving.ppsx | binary | |
MD5:3E420E212054DF37041240C03DE5A658 | SHA256:F81A7214E3BE811D175720002CC2851446CA09CBE2592394B77C70ECA98E4BDA | |||
| 896 | cmd.exe | C:\Users\admin\AppData\Local\Temp\Webshots.ppsx.bat | text | |
MD5:4BE2BC83969841071C0CCEE852A2FD6E | SHA256:CD2673270F49D550A644D085235B4C0C9E8F90EFC32233088E12650F8814592F | |||
| 5548 | Elektrus.exe | C:\Users\admin\AppData\Local\Temp\Webshots.ppsx | text | |
MD5:4BE2BC83969841071C0CCEE852A2FD6E | SHA256:CD2673270F49D550A644D085235B4C0C9E8F90EFC32233088E12650F8814592F | |||
| 5548 | Elektrus.exe | C:\Users\admin\AppData\Local\Temp\Prepaid.ppsx | binary | |
MD5:D411AE73E8B22453FE9306F30C5F3B98 | SHA256:5BB11E1304071D29F3973E7837C6491650D6C44AFFE31B9261F19154D0D33E20 | |||
| 5548 | Elektrus.exe | C:\Users\admin\AppData\Local\Temp\Ends.ppsx | binary | |
MD5:EB225AFCFC0697A14192351F7C30C14E | SHA256:CE01390CC12105FEF4958F26AAB0D4B4B07A5A70C890F8FD196415F530FDD9AE | |||
| 5548 | Elektrus.exe | C:\Users\admin\AppData\Local\Temp\Elections.ppsx | binary | |
MD5:819A1AE350FCA23FD6BAAAE2090CA78E | SHA256:F90AC9466619A729A19642EF56F35023F99E8FBA65A02ADF7ED691712E36FD34 | |||
| 856 | extrac32.exe | C:\Users\admin\AppData\Local\Temp\Catering | binary | |
MD5:6F614150C55AD39C850FBB4787D113D0 | SHA256:7589959320EBF3DD98A928A821BFFB85E948A22FE6217F143B60DB9316E973A2 | |||
| 5548 | Elektrus.exe | C:\Users\admin\AppData\Local\Temp\Else.ppsx | binary | |
MD5:5C0EC9ACDDFB1AFD2E8846736AD3C34E | SHA256:D99229DB0DE8AFA599BE8731B2C178679B2E82FC05F063899CD65FE5056FD235 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
— | — | GET | 200 | 104.83.4.146:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 92.123.37.9:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2104 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 104.83.4.146:80 | crl.microsoft.com | Akamai International B.V. | AT | whitelisted |
— | — | 92.123.37.9:80 | www.microsoft.com | AKAMAI-AS | AT | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
2112 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
2104 | svchost.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
6044 | slui.exe | 40.91.76.224:443 | activation-v2.sls.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
4740 | Instantly.com | 104.21.85.126:443 | clarmodq.top | CLOUDFLARENET | — | malicious |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |
hCJfNGJjNAnmyVkXDJjNZ.hCJfNGJjNAnmyVkXDJjNZ |
| unknown |
clarmodq.top |
| malicious |
self.events.data.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2196 | svchost.exe | Potentially Bad Traffic | ET DNS Query to a *.top domain - Likely Hostile |
2196 | svchost.exe | A Network Trojan was detected | MALWARE [ANY.RUN] Suspected Domain Associated with Malware Distribution (clarmodq .top) |
2196 | svchost.exe | Domain Observed Used for C2 Detected | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (clarmodq .top) |
4740 | Instantly.com | Domain Observed Used for C2 Detected | ET MALWARE Observed Win32/Lumma Stealer Related Domain (clarmodq .top in TLS SNI) |
4740 | Instantly.com | Domain Observed Used for C2 Detected | ET MALWARE Observed Win32/Lumma Stealer Related Domain (clarmodq .top in TLS SNI) |
4740 | Instantly.com | Domain Observed Used for C2 Detected | ET MALWARE Observed Win32/Lumma Stealer Related Domain (clarmodq .top in TLS SNI) |
4740 | Instantly.com | Domain Observed Used for C2 Detected | ET MALWARE Observed Win32/Lumma Stealer Related Domain (clarmodq .top in TLS SNI) |
4740 | Instantly.com | Domain Observed Used for C2 Detected | ET MALWARE Observed Win32/Lumma Stealer Related Domain (clarmodq .top in TLS SNI) |
4740 | Instantly.com | Domain Observed Used for C2 Detected | ET MALWARE Observed Win32/Lumma Stealer Related Domain (clarmodq .top in TLS SNI) |