File name: | 81e2acbd26c2d3dcfba65fdff1c91d0927bfbb5f9d7c923184c97af4edda63f1.exe |
Full analysis: | https://app.any.run/tasks/5d354c47-2412-4d18-a2ac-9bf20fc6f947 |
Verdict: | Malicious activity |
Threats: | Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat. |
Analysis date: | December 14, 2024, 11:57:24 |
OS: | Windows 10 Professional (build: 19045, 64 bit) |
Tags: | |
Indicators: | |
MIME: | application/vnd.microsoft.portable-executable |
File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 3 sections |
MD5: | 55F7F34A571A52CAEFB86F49F0246390 |
SHA1: | B25EC3D0943E17ED997B353865F3CEB24A498193 |
SHA256: | 81E2ACBD26C2D3DCFBA65FDFF1C91D0927BFBB5F9D7C923184C97AF4EDDA63F1 |
SSDEEP: | 12288:yqTBXYShxSioyOAbTVjpLBPROZZi5RMX8TfL:bXhxSioyOAbTVhB5Oa5OX8Tf |
.exe | | | Win32 EXE PECompact compressed (generic) (35.9) |
---|---|---|
.exe | | | Win32 Executable MS Visual C++ (generic) (27) |
.exe | | | Win64 Executable (generic) (23.9) |
.dll | | | Win32 Dynamic Link Library (generic) (5.6) |
.exe | | | Win32 Executable (generic) (3.9) |
ProductVersions: | 68.49.40.7 |
---|---|
OriginalFilenames: | Odilemio |
FileDescription: | Micror |
InternalName: | ChickenPlugez |
FileVersions: | 0.13.58.5 |
CharacterSet: | Unknown (14E2) |
LanguageCode: | Unknown (0324) |
FileSubtype: | - |
ObjectFileType: | Unknown |
FileOS: | Unknown (0x326) |
FileFlags: | (none) |
FileFlagsMask: | 0x765a |
ProductVersionNumber: | 71.0.0.0 |
FileVersionNumber: | 61.0.0.0 |
Subsystem: | Windows GUI |
SubsystemVersion: | 5 |
ImageVersion: | - |
OSVersion: | 5 |
EntryPoint: | 0x447f |
UninitializedDataSize: | - |
InitializedDataSize: | 66560 |
CodeSize: | 351744 |
LinkerVersion: | 9 |
PEType: | PE32 |
ImageFileCharacteristics: | No relocs, Executable, 32-bit |
TimeStamp: | 2023:08:19 13:49:40+00:00 |
MachineType: | Intel 386 or later, and compatibles |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2800 | "C:\Users\admin\Desktop\81e2acbd26c2d3dcfba65fdff1c91d0927bfbb5f9d7c923184c97af4edda63f1.exe" | C:\Users\admin\Desktop\81e2acbd26c2d3dcfba65fdff1c91d0927bfbb5f9d7c923184c97af4edda63f1.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 3221225477 Modules
| |||||||||||||||
2192 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
6404 | C:\WINDOWS\SysWOW64\WerFault.exe -u -p 2800 -s 1852 | C:\Windows\SysWOW64\WerFault.exe | 81e2acbd26c2d3dcfba65fdff1c91d0927bfbb5f9d7c923184c97af4edda63f1.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Problem Reporting Exit code: 0 Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
|
PID | Process | Filename | Type | |
---|---|---|---|---|
6404 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_81e2acbd26c2d3dc_55fab373a5e5d8852e96c7ef1839bfd85f419_fe7eac58_5b4227cf-f48e-4406-820a-fa19214cf2dd\Report.wer | — | |
MD5:— | SHA256:— | |||
6404 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\Temp\WERA945.tmp.xml | xml | |
MD5:7A2269D6A2E106B345CD6C7821711EB2 | SHA256:AD4A777D89C280E86852D2575CE423807CDE32A9C91625B4880D50C045A95B6F | |||
6404 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\Temp\WERA80B.tmp.dmp | binary | |
MD5:0CF8169BBEE087C523EF659DDB1F2FEC | SHA256:9958C26772B70C26C87C9B7D3A1099389CCFF992547D99D757F5C2FE5AE71A72 | |||
6404 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\Temp\WERA915.tmp.WERInternalMetadata.xml | xml | |
MD5:6C69997BCE59797676A7F5D9FC77E37E | SHA256:6A97EEF40CA8E11AE6AD8292FCFE22595C14DE582137B77604CBD95CFF9121BA | |||
6404 | WerFault.exe | C:\Users\admin\AppData\Local\CrashDumps\81e2acbd26c2d3dcfba65fdff1c91d0927bfbb5f9d7c923184c97af4edda63f1.exe.2800.dmp | binary | |
MD5:91ABBF2953992AD7E1CD7192F29FA607 | SHA256:BA28924AC312F79A8E2406A2F74389FD260C62837BF42F43D68CAA6AC47D9234 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
5856 | svchost.exe | GET | 200 | 23.48.23.156:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
4712 | MoUsoCoreWorker.exe | GET | 200 | 23.48.23.156:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
4712 | MoUsoCoreWorker.exe | GET | 200 | 2.19.217.218:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
5856 | svchost.exe | GET | 200 | 2.19.217.218:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | POST | 200 | 104.21.32.1:443 | https://brendon-sharjen.biz/api | unknown | text | 48 b | malicious |
— | — | POST | 200 | 104.21.80.1:443 | https://brendon-sharjen.biz/api | unknown | text | 17 b | malicious |
— | — | POST | 200 | 104.21.16.1:443 | https://brendon-sharjen.biz/api | unknown | text | 17 b | malicious |
— | — | POST | 200 | 104.21.112.1:443 | https://brendon-sharjen.biz/api | unknown | text | 17 b | malicious |
— | — | POST | 200 | 104.21.96.1:443 | https://brendon-sharjen.biz/api | unknown | text | 16.7 Kb | malicious |
— | — | POST | 200 | 104.21.48.1:443 | https://brendon-sharjen.biz/api | unknown | text | 17 b | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
4712 | MoUsoCoreWorker.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 192.168.100.255:137 | — | — | — | whitelisted |
5856 | svchost.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 23.212.110.163:443 | www.bing.com | Akamai International B.V. | CZ | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
2800 | 81e2acbd26c2d3dcfba65fdff1c91d0927bfbb5f9d7c923184c97af4edda63f1.exe | 104.21.96.1:443 | brendon-sharjen.biz | CLOUDFLARENET | — | malicious |
4712 | MoUsoCoreWorker.exe | 23.48.23.156:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
5856 | svchost.exe | 23.48.23.156:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
4712 | MoUsoCoreWorker.exe | 2.19.217.218:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
Domain | IP | Reputation |
---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
www.bing.com |
| whitelisted |
google.com |
| whitelisted |
brendon-sharjen.biz |
| malicious |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
watson.events.data.microsoft.com |
| whitelisted |
self.events.data.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
— | — | Domain Observed Used for C2 Detected | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (brendon-sharjen .biz) |
— | — | Domain Observed Used for C2 Detected | ET MALWARE Observed Win32/Lumma Stealer Related Domain (brendon-sharjen .biz in TLS SNI) |
— | — | Domain Observed Used for C2 Detected | ET MALWARE Observed Win32/Lumma Stealer Related Domain (brendon-sharjen .biz in TLS SNI) |
— | — | Domain Observed Used for C2 Detected | ET MALWARE Observed Win32/Lumma Stealer Related Domain (brendon-sharjen .biz in TLS SNI) |
— | — | Domain Observed Used for C2 Detected | ET MALWARE Observed Win32/Lumma Stealer Related Domain (brendon-sharjen .biz in TLS SNI) |
— | — | Domain Observed Used for C2 Detected | ET MALWARE Observed Win32/Lumma Stealer Related Domain (brendon-sharjen .biz in TLS SNI) |
— | — | Domain Observed Used for C2 Detected | ET MALWARE Observed Win32/Lumma Stealer Related Domain (brendon-sharjen .biz in TLS SNI) |