File name:

Fluxus-Roblox-Executor-main.zip

Full analysis: https://app.any.run/tasks/531b5b88-c8a9-43a2-9055-c39d1b3c7768
Verdict: Malicious activity
Threats:

Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat.

Analysis date: January 12, 2025, 13:22:14
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
lumma
stealer
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract, compression method=store
MD5:

D375896C64D2E8B758D0A191B875A536

SHA1:

D79114C5029AEA44F37CBD6FE074948E900C0CA7

SHA256:

A545F43635CC85125E34F7613CD2E1C15CD70F6683AE60F4601B9EF762F2CCE2

SSDEEP:

12288:OabITxaE8Pni0/uyX3Uif/qBl/9JYi6FO0sKw7WsOAlFJ:OabuxafPni0/JX3UuSBl/Tp680sKw7W0

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • aspnet_regiis.exe (PID: 6848)
      • aspnet_regiis.exe (PID: 5572)
    • LUMMA has been detected (SURICATA)

      • aspnet_regiis.exe (PID: 6848)
      • aspnet_regiis.exe (PID: 5572)
    • LUMMA mutex has been found

      • aspnet_regiis.exe (PID: 6848)
      • aspnet_regiis.exe (PID: 5572)
    • Steals credentials from Web Browsers

      • aspnet_regiis.exe (PID: 5572)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Fluxus V7.exe (PID: 6956)
      • Fluxus V7.exe (PID: 5236)
    • Contacting a server suspected of hosting an CnC

      • aspnet_regiis.exe (PID: 6848)
      • aspnet_regiis.exe (PID: 5572)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6596)
    • The process uses the downloaded file

      • WinRAR.exe (PID: 6596)
    • Checks supported languages

      • Fluxus V7.exe (PID: 6956)
      • aspnet_regiis.exe (PID: 6848)
      • Fluxus V7.exe (PID: 5236)
      • aspnet_regiis.exe (PID: 5572)
    • Reads the computer name

      • Fluxus V7.exe (PID: 6956)
      • aspnet_regiis.exe (PID: 6848)
      • aspnet_regiis.exe (PID: 5572)
    • Manual execution by a user

      • Fluxus V7.exe (PID: 6956)
      • Fluxus V7.exe (PID: 5236)
    • Creates files or folders in the user directory

      • Fluxus V7.exe (PID: 6956)
      • Fluxus V7.exe (PID: 5236)
    • Reads the software policy settings

      • aspnet_regiis.exe (PID: 6848)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 10
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2025:01:10 08:24:44
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: Fluxus-Roblox-Executor-main/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
134
Monitored processes
9
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe rundll32.exe no specs fluxus v7.exe conhost.exe no specs #LUMMA aspnet_regiis.exe fluxus v7.exe conhost.exe no specs #LUMMA aspnet_regiis.exe svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
2192C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
5028\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeFluxus V7.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5236"C:\Users\admin\Desktop\Fluxus-Roblox-Executor-main\Fluxus V7.exe" C:\Users\admin\Desktop\Fluxus-Roblox-Executor-main\Fluxus V7.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
black object organize.exe
Exit code:
0
Version:
8.7.5.2
Modules
Images
c:\users\admin\desktop\fluxus-roblox-executor-main\fluxus v7.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
5300C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
5572"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
Fluxus V7.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
aspnet_regiis.exe
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\aspnet_regiis.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\shell32.dll
c:\windows\syswow64\msvcp_win.dll
6596"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\Fluxus-Roblox-Executor-main.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6848"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
Fluxus V7.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
aspnet_regiis.exe
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\aspnet_regiis.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shell32.dll
6948\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeFluxus V7.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6956"C:\Users\admin\Desktop\Fluxus-Roblox-Executor-main\Fluxus V7.exe" C:\Users\admin\Desktop\Fluxus-Roblox-Executor-main\Fluxus V7.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
black object organize.exe
Exit code:
0
Version:
8.7.5.2
Modules
Images
c:\users\admin\desktop\fluxus-roblox-executor-main\fluxus v7.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
Total events
3 090
Read events
3 066
Write events
11
Delete events
13

Modification events

(PID) Process:(6596) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(6596) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(6596) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(6596) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Fluxus-Roblox-Executor-main.zip
(PID) Process:(6596) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6596) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6596) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6596) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(6596) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:15
Value:
(PID) Process:(6596) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:14
Value:
Executable files
3
Suspicious files
2
Text files
22
Unknown types
0

Dropped files

PID
Process
Filename
Type
6596WinRAR.exeC:\Users\admin\Desktop\Fluxus-Roblox-Executor-main\Executor\Properties\AssemblyInfo.cstext
MD5:28ADDFA6C9902ABB21B255A4390DACF3
SHA256:4A6313C09A5380520D4EA9F00A962D5570CA91E6A4729BC0264630C5C4391406
6596WinRAR.exeC:\Users\admin\Desktop\Fluxus-Roblox-Executor-main\Client\Executor.luabinary
MD5:C460F216DDBA7B3371CB75CE44E880F4
SHA256:C7C6BE85E49FA37A01E33F85BC67F2D886DCC813D5D33590A8F7394744C44A7E
6596WinRAR.exeC:\Users\admin\Desktop\Fluxus-Roblox-Executor-main\Executor\Resources\darkDex.pngimage
MD5:837760BB4338A6D21922D3699E1A7342
SHA256:AB397E419F0E3BAC74ED017F6BACAF5FAD1B0DF6DBC728A8EF5ADF992A116659
6596WinRAR.exeC:\Users\admin\Desktop\Fluxus-Roblox-Executor-main\Executor\ScriptHub.csbinary
MD5:424391FB512618DC1E6A0D1E60599DBB
SHA256:17BC277525238E84D29B4792B420D0565E7A07991BF4A427459CFD00BBB28296
6596WinRAR.exeC:\Users\admin\Desktop\Fluxus-Roblox-Executor-main\Executor\Options.Designer.cstext
MD5:D9EC63727890650E25424447878A7F26
SHA256:1B0F2678AC3D46A9E9EB85024A582672EA67294924A7DE315356676B6E9EF609
6596WinRAR.exeC:\Users\admin\Desktop\Fluxus-Roblox-Executor-main\Executor\App.configxml
MD5:CC46A0995713BA7CB577B4BBBEDF83E8
SHA256:5FE1AD802F68D7C47DBBD8E60162BA88ABAED162DA5D381C85D3E4935311962E
6596WinRAR.exeC:\Users\admin\Desktop\Fluxus-Roblox-Executor-main\Executor\ScriptHub.Designer.cstext
MD5:40C24708A84EADAC4418329EF22D7AAE
SHA256:77B20F2FD70A530734B3CD1059CA08EA771F216F9F23434A181441C731C8AB4D
6596WinRAR.exeC:\Users\admin\Desktop\Fluxus-Roblox-Executor-main\Executor\UI.resxxml
MD5:2E963ABDFA5E74A2EB17BFFAA9D59382
SHA256:C41381171860D07D6FCC82106C7756560F54E79E8C8E2572BF5F8B07C02F9BC0
6596WinRAR.exeC:\Users\admin\Desktop\Fluxus-Roblox-Executor-main\Executor\Properties\Resources.resxxml
MD5:9A7839C8BE86269C7E41758C610A78CC
SHA256:9F45FB0F6A9CC094E614922BC9B29B8CE0CA99967BF318137862B8BC2AD36C37
6596WinRAR.exeC:\Users\admin\Desktop\Fluxus-Roblox-Executor-main\Executor\Options.cstext
MD5:8F08FA6B05130CBFB018B0DD00AD7A68
SHA256:9F0BF9E1C7B3297BD15965B138C59E1183AB5DEAEB8157E801ACA1340CFD3FEA
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
44
DNS requests
17
Threats
13

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.48.23.166:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
DE
binary
1.01 Kb
whitelisted
GET
200
23.37.237.227:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
DE
binary
973 b
whitelisted
GET
200
23.37.237.227:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
DE
binary
973 b
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
US
binary
471 b
whitelisted
1344
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
NL
binary
419 b
whitelisted
6404
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
US
binary
471 b
whitelisted
1344
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
NL
binary
408 b
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
US
binary
313 b
whitelisted
GET
200
23.48.23.166:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
DE
binary
1.01 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5064
SearchApp.exe
2.16.204.135:443
www.bing.com
Akamai International B.V.
DE
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
23.48.23.166:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
23.37.237.227:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
1176
svchost.exe
20.190.160.14:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1076
svchost.exe
23.35.238.131:443
go.microsoft.com
AKAMAI-AS
DE
whitelisted
4712
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.104.136.2
whitelisted
www.bing.com
  • 2.16.204.135
  • 2.16.204.148
  • 2.16.204.160
  • 2.16.204.155
  • 2.16.204.141
  • 2.16.204.161
  • 2.16.204.158
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
crl.microsoft.com
  • 23.48.23.166
  • 23.48.23.156
  • 23.48.23.143
whitelisted
www.microsoft.com
  • 23.37.237.227
  • 95.101.149.131
whitelisted
google.com
  • 142.250.184.206
whitelisted
login.live.com
  • 20.190.160.14
  • 40.126.32.68
  • 40.126.32.134
  • 40.126.32.133
  • 40.126.32.74
  • 20.190.160.22
  • 40.126.32.76
  • 20.190.160.17
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted
undesirabkel.click
  • 188.114.96.3
  • 188.114.97.3
malicious
arc.msn.com
  • 20.223.35.26
whitelisted

Threats

PID
Process
Class
Message
Domain Observed Used for C2 Detected
ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (undesirabkel .click)
6848
aspnet_regiis.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)
6848
aspnet_regiis.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)
6848
aspnet_regiis.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)
6848
aspnet_regiis.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)
6848
aspnet_regiis.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)
6848
aspnet_regiis.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)
5572
aspnet_regiis.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)
5572
aspnet_regiis.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)
5572
aspnet_regiis.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)
No debug info