URL:

https://piratesfile.com

Full analysis: https://app.any.run/tasks/5268ad4c-4673-418d-af15-32d96526201e
Verdict: Malicious activity
Threats:

Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat.

Analysis date: July 14, 2023, 12:29:34
OS: Windows 7 Professional Service Pack 1 (build: 7601, 64 bit)
Tags:
lumma
stealer
Indicators:
MD5:

BB55C432A48EA706C1948A009CC2A742

SHA1:

3D11DDBD6D6F5C01995C0E2D176402C49A4C0E03

SHA256:

599CFAE969F29452067FE51DA1FD9B25676FFB4BE60575FC401BC92B6D359CE6

SSDEEP:

3:N8IURv9LGT:2IIvpGT

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Setup.exe (PID: 1888)
    • LUMMA detected by memory dumps

      • MSBuild.exe (PID: 280)
    • LUMMA was detected

      • MSBuild.exe (PID: 280)
    • Actions looks like stealing of personal data

      • MSBuild.exe (PID: 280)
  • SUSPICIOUS

    • Reads the Internet Settings

      • MSBuild.exe (PID: 280)
    • Searches for installed software

      • MSBuild.exe (PID: 280)
  • INFO

    • The process uses the downloaded file

      • WinRAR.exe (PID: 3344)
      • firefox.exe (PID: 2012)
    • Application launched itself

      • firefox.exe (PID: 2012)
    • Checks supported languages

      • Setup.exe (PID: 1888)
      • MSBuild.exe (PID: 280)
    • Reads the computer name

      • Setup.exe (PID: 1888)
      • MSBuild.exe (PID: 280)
    • Reads the machine GUID from the registry

      • Setup.exe (PID: 1888)
      • MSBuild.exe (PID: 280)
    • Manual execution by a user

      • Setup.exe (PID: 1888)
    • The process checks LSA protection

      • Setup.exe (PID: 1888)
      • MSBuild.exe (PID: 280)
    • Checks proxy server information

      • MSBuild.exe (PID: 280)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3344)
      • firefox.exe (PID: 2012)
    • Creates files or folders in the user directory

      • MSBuild.exe (PID: 280)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Lumma

(PID) Process(280) MSBuild.exe
C2skicloud-my.xyz/c2sock
Options
LummaIDKjGtqi--ZUBA
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
50
Monitored processes
10
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start firefox.exe firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs winrar.exe setup.exe no specs #LUMMA msbuild.exe

Process information

PID
CMD
Path
Indicators
Parent process
280"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
Setup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
MSBuild.exe
Exit code:
0
Version:
4.7.2558.0 built by: NET471REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\msbuild.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
Lumma
(PID) Process(280) MSBuild.exe
C2skicloud-my.xyz/c2sock
Options
LummaIDKjGtqi--ZUBA
320"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2012.20.92194309\232232830" -childID 3 -isForBrowser -prefsHandle 3348 -prefMapHandle 3352 -prefsLen 6545 -prefMapSize 189239 -parentBuildID 20190619235627 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 2012 "\\.\pipe\gecko-crash-server-pipe.2012" 3364 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
67.0.4
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\rpcrt4.dll
c:\program files\mozilla firefox\msvcp140.dll
c:\program files\mozilla firefox\vcruntime140.dll
1888"C:\Users\admin\Desktop\Setup.exe" C:\Users\admin\Desktop\Setup.exeexplorer.exe
User:
admin
Company:
ESTsoft Corp.
Integrity Level:
MEDIUM
Description:
ALZip
Exit code:
0
Version:
23.3.9.1
Modules
Images
c:\users\admin\desktop\setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\mscoree.dll
1952"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2012.0.2089527503\499195641" -parentBuildID 20190619235627 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 2012 "\\.\pipe\gecko-crash-server-pipe.2012" 1152 gpuC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
67.0.4
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\dbghelp.dll
c:\windows\system32\rpcrt4.dll
2012"C:\Program Files\Mozilla Firefox\firefox.exe" "https://piratesfile.com"C:\Program Files\Mozilla Firefox\firefox.exe
explorer.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
67.0.4
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dbghelp.dll
2408"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2012.27.982866288\623919414" -childID 4 -isForBrowser -prefsHandle 3660 -prefMapHandle 3712 -prefsLen 7440 -prefMapSize 189239 -parentBuildID 20190619235627 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 2012 "\\.\pipe\gecko-crash-server-pipe.2012" 3280 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
67.0.4
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dbghelp.dll
2468"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2012.13.940125891\498593619" -childID 2 -isForBrowser -prefsHandle 2292 -prefMapHandle 2704 -prefsLen 5823 -prefMapSize 189239 -parentBuildID 20190619235627 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 2012 "\\.\pipe\gecko-crash-server-pipe.2012" 2712 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
67.0.4
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\version.dll
3144"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2012.3.2054636157\59670426" -childID 1 -isForBrowser -prefsHandle 1896 -prefMapHandle 1904 -prefsLen 1 -prefMapSize 189239 -parentBuildID 20190619235627 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 2012 "\\.\pipe\gecko-crash-server-pipe.2012" 1332 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
67.0.4
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dbghelp.dll
3344"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Complete_Setup_PassWord_is_449911.rar"C:\Program Files\WinRAR\WinRAR.exe
firefox.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\program files\winrar\winrar.exe
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\winsxs\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_fa3b1e3d17594757\comctl32.dll
3648"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2012.34.2036717300\1431900058" -childID 5 -isForBrowser -prefsHandle 3604 -prefMapHandle 7432 -prefsLen 7498 -prefMapSize 189239 -parentBuildID 20190619235627 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 2012 "\\.\pipe\gecko-crash-server-pipe.2012" 7284 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
67.0.4
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dbghelp.dll
Total events
6 838
Read events
6 807
Write events
31
Delete events
0

Modification events

(PID) Process:(2012) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Browser
Value:
0000000000000000
(PID) Process:(2012) firefox.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2012) firefox.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
460000008E000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(2012) firefox.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2012) firefox.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2012) firefox.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2012) firefox.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(3344) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\155\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3344) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(3344) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7AndW2K8R2-KB3191566-x64.zip
Executable files
113
Suspicious files
274
Text files
777
Unknown types
1

Dropped files

PID
Process
Filename
Type
2012firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\nltxvmn2.default\startupCache\scriptCache-current.bin
MD5:
SHA256:
2012firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\nltxvmn2.default\startupCache\scriptCache-child-current.binbinary
MD5:2B6B5ABCA010270C502C5DD277CD9E7A
SHA256:99DF8717921F70577FCE3386BB7962A804E490C7157F764458001843A1EC606C
2012firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\nltxvmn2.default\permissions.sqlite-journalbinary
MD5:7851637BB557EB8386E826767FEA6D2D
SHA256:7D570D90C69B87AA214A3AA39BC9780167F3F6A714B2F66F7AD3D3452705DEE2
2012firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\nltxvmn2.default\sessionCheckpoints.jsonbinary
MD5:EA8B62857DFDBD3D0BE7D7E4A954EC9A
SHA256:792955295AE9C382986222C6731C5870BD0E921E7F7E34CC4615F5CD67F225DA
2012firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\nltxvmn2.default\startupCache\urlCache-current.binbinary
MD5:6BED2A248268034CA1F73B2925365DE2
SHA256:A45996AA907815E86366A17ED448F75A584D7B600AA9398E14DE21DFAD3D613A
2012firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\nltxvmn2.default\prefs.jstext
MD5:1759FBCEFAC92AE1A7B8E457ACF71748
SHA256:5DA473B0E0C84BE5B289DC97C259B98F674E17AF49F4723B4A90F73AA972B739
2012firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\nltxvmn2.default\search.json.mozlz4binary
MD5:70E928C3CB55B3E035FCEB727C66ECC3
SHA256:8A9DF17FD6BE51C74DB01F41E4FB4D394939D43BC54D204052E9651F00C48B09
2012firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\nltxvmn2.default\prefs-1.jstext
MD5:1759FBCEFAC92AE1A7B8E457ACF71748
SHA256:5DA473B0E0C84BE5B289DC97C259B98F674E17AF49F4723B4A90F73AA972B739
2012firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\nltxvmn2.default\storage\permanent\chrome\idb\1451318868ntouromlalnodry--epcr.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
2012firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\nltxvmn2.default\safebrowsing-updating\block-flash-digest256.psetbinary
MD5:076933FF9904D1110D896E2C525E39E5
SHA256:4CBBD8CA5215B8D161AEC181A74B694F4E24B001D5B081DC0030ED797A8973E0
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
76
TCP/UDP connections
156
DNS requests
141
Threats
114

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2012
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/success.txt
US
text
8 b
whitelisted
2012
firefox.exe
GET
200
23.53.40.162:80
http://ciscobinary.openh264.org/openh264-win64-2e1774ab6dc6c43debb0b5b628bdf122a391d521.zip
NL
compressed
442 Kb
whitelisted
2012
firefox.exe
POST
200
184.24.77.83:80
http://r3.o.lencr.org/
US
binary
503 b
shared
2012
firefox.exe
POST
200
192.229.221.95:80
http://ocsp.digicert.com/
US
binary
471 b
whitelisted
2012
firefox.exe
POST
200
184.24.77.83:80
http://r3.o.lencr.org/
US
binary
503 b
shared
2012
firefox.exe
POST
200
142.250.186.99:80
http://ocsp.pki.goog/gts1c3
US
binary
471 b
whitelisted
2012
firefox.exe
POST
200
184.24.77.83:80
http://r3.o.lencr.org/
US
binary
503 b
shared
2012
firefox.exe
GET
200
24.199.67.96:80
http://24.199.67.96/?64b1401b35ff7=98ce4c855e211c4c1806f2f576dec93d&64b1401b35ffe=3250&64b1401b35fff=1_xforce-keygen-download-with-crack-64-bit&gkss=372433
US
html
222 b
unknown
2012
firefox.exe
GET
404
24.199.67.96:80
http://24.199.67.96/favicon.ico
US
html
274 b
unknown
2012
firefox.exe
POST
200
192.229.221.95:80
http://ocsp.digicert.com/
US
binary
471 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2012
firefox.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
2012
firefox.exe
34.120.158.37:443
tracking-protection.cdn.mozilla.net
GOOGLE-CLOUD-PLATFORM
US
unknown
2012
firefox.exe
188.114.97.3:443
piratesfile.com
CLOUDFLARENET
NL
malicious
2012
firefox.exe
184.24.77.45:80
r3.o.lencr.org
Akamai International B.V.
DE
unknown
2012
firefox.exe
13.32.121.85:443
snippets.cdn.mozilla.net
AMAZON-02
US
suspicious
2012
firefox.exe
23.53.40.162:80
ciscobinary.openh264.org
Akamai International B.V.
DE
unknown
2012
firefox.exe
35.244.181.201:443
aus5.mozilla.org
GOOGLE
US
suspicious
2012
firefox.exe
34.107.221.82:80
detectportal.firefox.com
GOOGLE
US
whitelisted
2012
firefox.exe
188.114.96.3:443
piratesfile.com
CLOUDFLARENET
NL
malicious
2012
firefox.exe
34.160.46.54:443
search.services.mozilla.com
GOOGLE
US
suspicious

DNS requests

Domain
IP
Reputation
piratesfile.com
  • 188.114.96.3
  • 188.114.97.3
  • 2a06:98c1:3120::3
  • 2a06:98c1:3121::3
malicious
detectportal.firefox.com
  • 34.107.221.82
whitelisted
prod.detectportal.prod.cloudops.mozgcp.net
  • 34.107.221.82
  • 2600:1901:0:38d7::
whitelisted
search.services.mozilla.com
  • 34.160.46.54
whitelisted
search.r53-2.services.mozilla.com
  • 34.160.46.54
whitelisted
push.services.mozilla.com
  • 34.117.65.55
whitelisted
autopush.prod.mozaws.net
  • 34.117.65.55
whitelisted
tiles.services.mozilla.com
whitelisted
snippets.cdn.mozilla.net
  • 13.32.121.49
  • 13.32.121.112
  • 13.32.121.85
  • 13.32.121.15
whitelisted
r3.o.lencr.org
  • 184.24.77.83
  • 184.24.77.82
  • 184.24.77.45
  • 184.24.77.46
  • 184.24.77.61
  • 184.24.77.57
  • 184.24.77.58
  • 184.24.77.62
  • 184.24.77.55
  • 184.24.77.59
  • 184.24.77.54
  • 184.24.77.56
  • 184.24.77.70
  • 184.24.77.79
  • 184.24.77.75
  • 184.24.77.81
  • 184.24.77.77
  • 184.24.77.76
  • 2.16.241.8
  • 2.16.241.15
shared

Threats

PID
Process
Class
Message
280
MSBuild.exe
Malware Command and Control Activity Detected
ET MALWARE [ANY.RUN] Win32/Lumma Stealer Configuration Request Attempt
280
MSBuild.exe
Malware Command and Control Activity Detected
STEALER [ANY.RUN] Win32/Lumma Stealer Configuration Request Attempt
280
MSBuild.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
280
MSBuild.exe
A Network Trojan was detected
ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2
280
MSBuild.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
280
MSBuild.exe
A Network Trojan was detected
ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2
280
MSBuild.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
280
MSBuild.exe
A Network Trojan was detected
ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2
280
MSBuild.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
280
MSBuild.exe
A Network Trojan was detected
ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2
1 ETPRO signatures available at the full report
No debug info