File name:

Fluxus-Roblox-Executor-main.zip

Full analysis: https://app.any.run/tasks/531b5b88-c8a9-43a2-9055-c39d1b3c7768
Verdict: Malicious activity
Threats:

Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat.

Analysis date: January 12, 2025, 13:22:14
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
lumma
stealer
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract, compression method=store
MD5:

D375896C64D2E8B758D0A191B875A536

SHA1:

D79114C5029AEA44F37CBD6FE074948E900C0CA7

SHA256:

A545F43635CC85125E34F7613CD2E1C15CD70F6683AE60F4601B9EF762F2CCE2

SSDEEP:

12288:OabITxaE8Pni0/uyX3Uif/qBl/9JYi6FO0sKw7WsOAlFJ:OabuxafPni0/JX3UuSBl/Tp680sKw7W0

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • aspnet_regiis.exe (PID: 6848)
      • aspnet_regiis.exe (PID: 5572)
    • LUMMA has been detected (SURICATA)

      • aspnet_regiis.exe (PID: 6848)
      • aspnet_regiis.exe (PID: 5572)
    • LUMMA mutex has been found

      • aspnet_regiis.exe (PID: 6848)
      • aspnet_regiis.exe (PID: 5572)
    • Steals credentials from Web Browsers

      • aspnet_regiis.exe (PID: 5572)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Fluxus V7.exe (PID: 6956)
      • Fluxus V7.exe (PID: 5236)
    • Contacting a server suspected of hosting an CnC

      • aspnet_regiis.exe (PID: 6848)
      • aspnet_regiis.exe (PID: 5572)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6596)
    • The process uses the downloaded file

      • WinRAR.exe (PID: 6596)
    • Reads the computer name

      • Fluxus V7.exe (PID: 6956)
      • aspnet_regiis.exe (PID: 6848)
      • aspnet_regiis.exe (PID: 5572)
    • Creates files or folders in the user directory

      • Fluxus V7.exe (PID: 6956)
      • Fluxus V7.exe (PID: 5236)
    • Manual execution by a user

      • Fluxus V7.exe (PID: 6956)
      • Fluxus V7.exe (PID: 5236)
    • Checks supported languages

      • aspnet_regiis.exe (PID: 6848)
      • Fluxus V7.exe (PID: 6956)
      • Fluxus V7.exe (PID: 5236)
      • aspnet_regiis.exe (PID: 5572)
    • Reads the software policy settings

      • aspnet_regiis.exe (PID: 6848)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 10
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2025:01:10 08:24:44
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: Fluxus-Roblox-Executor-main/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
134
Monitored processes
9
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe rundll32.exe no specs fluxus v7.exe conhost.exe no specs #LUMMA aspnet_regiis.exe fluxus v7.exe conhost.exe no specs #LUMMA aspnet_regiis.exe svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
2192C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
5028\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeFluxus V7.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5236"C:\Users\admin\Desktop\Fluxus-Roblox-Executor-main\Fluxus V7.exe" C:\Users\admin\Desktop\Fluxus-Roblox-Executor-main\Fluxus V7.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
black object organize.exe
Exit code:
0
Version:
8.7.5.2
Modules
Images
c:\users\admin\desktop\fluxus-roblox-executor-main\fluxus v7.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
5300C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
5572"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
Fluxus V7.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
aspnet_regiis.exe
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\aspnet_regiis.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\shell32.dll
c:\windows\syswow64\msvcp_win.dll
6596"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\Fluxus-Roblox-Executor-main.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6848"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
Fluxus V7.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
aspnet_regiis.exe
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\aspnet_regiis.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shell32.dll
6948\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeFluxus V7.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6956"C:\Users\admin\Desktop\Fluxus-Roblox-Executor-main\Fluxus V7.exe" C:\Users\admin\Desktop\Fluxus-Roblox-Executor-main\Fluxus V7.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
black object organize.exe
Exit code:
0
Version:
8.7.5.2
Modules
Images
c:\users\admin\desktop\fluxus-roblox-executor-main\fluxus v7.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
Total events
3 090
Read events
3 066
Write events
11
Delete events
13

Modification events

(PID) Process:(6596) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(6596) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(6596) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(6596) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Fluxus-Roblox-Executor-main.zip
(PID) Process:(6596) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6596) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6596) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6596) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(6596) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:15
Value:
(PID) Process:(6596) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:14
Value:
Executable files
3
Suspicious files
2
Text files
22
Unknown types
0

Dropped files

PID
Process
Filename
Type
6596WinRAR.exeC:\Users\admin\Desktop\Fluxus-Roblox-Executor-main\Executor\App.configxml
MD5:CC46A0995713BA7CB577B4BBBEDF83E8
SHA256:5FE1AD802F68D7C47DBBD8E60162BA88ABAED162DA5D381C85D3E4935311962E
6596WinRAR.exeC:\Users\admin\Desktop\Fluxus-Roblox-Executor-main\Client\Executor.luabinary
MD5:C460F216DDBA7B3371CB75CE44E880F4
SHA256:C7C6BE85E49FA37A01E33F85BC67F2D886DCC813D5D33590A8F7394744C44A7E
6596WinRAR.exeC:\Users\admin\Desktop\Fluxus-Roblox-Executor-main\Executor\Executor.csprojxml
MD5:18BE9AE11B22CBCFA726E824C1A0CF99
SHA256:06434583047300BD78D790C89356149625BAF61BAFC6C9E77A7388D81D7264BF
6596WinRAR.exeC:\Users\admin\Desktop\Fluxus-Roblox-Executor-main\Executor\Options.resxxml
MD5:226CC064E1041C4154225F2D907A11CD
SHA256:19F5D9A06864007D5AEC92C6650388CE6CC695BB3D3C54E3AAFE5F6E84B34202
6596WinRAR.exeC:\Users\admin\Desktop\Fluxus-Roblox-Executor-main\Executor\Properties\AssemblyInfo.cstext
MD5:28ADDFA6C9902ABB21B255A4390DACF3
SHA256:4A6313C09A5380520D4EA9F00A962D5570CA91E6A4729BC0264630C5C4391406
6596WinRAR.exeC:\Users\admin\Desktop\Fluxus-Roblox-Executor-main\Executor\Properties\Resources.Designer.cstext
MD5:909904EDAB009F0054C2E63E0EF541C3
SHA256:AA021C1CFF6556F304103031BEC5145F575D28FECF6550F4F63C1FC0806FFBC5
6596WinRAR.exeC:\Users\admin\Desktop\Fluxus-Roblox-Executor-main\Executor\Properties\Resources.resxxml
MD5:9A7839C8BE86269C7E41758C610A78CC
SHA256:9F45FB0F6A9CC094E614922BC9B29B8CE0CA99967BF318137862B8BC2AD36C37
6596WinRAR.exeC:\Users\admin\Desktop\Fluxus-Roblox-Executor-main\Executor\Properties\Settings.Designer.cstext
MD5:210C0366028C8D7D600F97865F4EFF36
SHA256:0195B2BAD68B26160E5C8657A4977579EAABB8E699B7BF3391295B87B57837A0
6596WinRAR.exeC:\Users\admin\Desktop\Fluxus-Roblox-Executor-main\Executor\Properties\Settings.settingsxml
MD5:29A2BB6BD6F85FF04804C473E895DE92
SHA256:BABA99193FC1787141063B135424B476FF4151BEB833883FCB594631F17C0147
6596WinRAR.exeC:\Users\admin\Desktop\Fluxus-Roblox-Executor-main\Executor\Options.cstext
MD5:8F08FA6B05130CBFB018B0DD00AD7A68
SHA256:9F0BF9E1C7B3297BD15965B138C59E1183AB5DEAEB8157E801ACA1340CFD3FEA
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
44
DNS requests
17
Threats
13

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
GET
200
23.48.23.166:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.48.23.166:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.37.237.227:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
23.37.237.227:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6404
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
1344
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1344
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5064
SearchApp.exe
2.16.204.135:443
www.bing.com
Akamai International B.V.
DE
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
23.48.23.166:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
23.37.237.227:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
1176
svchost.exe
20.190.160.14:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1076
svchost.exe
23.35.238.131:443
go.microsoft.com
AKAMAI-AS
DE
whitelisted
4712
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.104.136.2
whitelisted
www.bing.com
  • 2.16.204.135
  • 2.16.204.148
  • 2.16.204.160
  • 2.16.204.155
  • 2.16.204.141
  • 2.16.204.161
  • 2.16.204.158
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
crl.microsoft.com
  • 23.48.23.166
  • 23.48.23.156
  • 23.48.23.143
whitelisted
www.microsoft.com
  • 23.37.237.227
  • 95.101.149.131
whitelisted
google.com
  • 142.250.184.206
whitelisted
login.live.com
  • 20.190.160.14
  • 40.126.32.68
  • 40.126.32.134
  • 40.126.32.133
  • 40.126.32.74
  • 20.190.160.22
  • 40.126.32.76
  • 20.190.160.17
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted
undesirabkel.click
  • 188.114.96.3
  • 188.114.97.3
malicious
arc.msn.com
  • 20.223.35.26
whitelisted

Threats

PID
Process
Class
Message
Domain Observed Used for C2 Detected
ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (undesirabkel .click)
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)
No debug info