File name:

Fluxus-Roblox-Executor-main.zip

Full analysis: https://app.any.run/tasks/531b5b88-c8a9-43a2-9055-c39d1b3c7768
Verdict: Malicious activity
Threats:

Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat.

Analysis date: January 12, 2025, 13:22:14
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
lumma
stealer
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract, compression method=store
MD5:

D375896C64D2E8B758D0A191B875A536

SHA1:

D79114C5029AEA44F37CBD6FE074948E900C0CA7

SHA256:

A545F43635CC85125E34F7613CD2E1C15CD70F6683AE60F4601B9EF762F2CCE2

SSDEEP:

12288:OabITxaE8Pni0/uyX3Uif/qBl/9JYi6FO0sKw7WsOAlFJ:OabuxafPni0/JX3UuSBl/Tp680sKw7W0

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • LUMMA has been detected (SURICATA)

      • aspnet_regiis.exe (PID: 6848)
      • aspnet_regiis.exe (PID: 5572)
    • LUMMA mutex has been found

      • aspnet_regiis.exe (PID: 5572)
      • aspnet_regiis.exe (PID: 6848)
    • Steals credentials from Web Browsers

      • aspnet_regiis.exe (PID: 5572)
    • Actions looks like stealing of personal data

      • aspnet_regiis.exe (PID: 5572)
      • aspnet_regiis.exe (PID: 6848)
  • SUSPICIOUS

    • Contacting a server suspected of hosting an CnC

      • aspnet_regiis.exe (PID: 5572)
      • aspnet_regiis.exe (PID: 6848)
    • Executable content was dropped or overwritten

      • Fluxus V7.exe (PID: 5236)
      • Fluxus V7.exe (PID: 6956)
  • INFO

    • Manual execution by a user

      • Fluxus V7.exe (PID: 6956)
      • Fluxus V7.exe (PID: 5236)
    • Checks supported languages

      • Fluxus V7.exe (PID: 6956)
      • Fluxus V7.exe (PID: 5236)
      • aspnet_regiis.exe (PID: 5572)
      • aspnet_regiis.exe (PID: 6848)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6596)
    • The process uses the downloaded file

      • WinRAR.exe (PID: 6596)
    • Reads the computer name

      • Fluxus V7.exe (PID: 6956)
      • aspnet_regiis.exe (PID: 5572)
      • aspnet_regiis.exe (PID: 6848)
    • Creates files or folders in the user directory

      • Fluxus V7.exe (PID: 5236)
      • Fluxus V7.exe (PID: 6956)
    • Reads the software policy settings

      • aspnet_regiis.exe (PID: 6848)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 10
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2025:01:10 08:24:44
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: Fluxus-Roblox-Executor-main/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
134
Monitored processes
9
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe rundll32.exe no specs fluxus v7.exe conhost.exe no specs #LUMMA aspnet_regiis.exe fluxus v7.exe conhost.exe no specs #LUMMA aspnet_regiis.exe svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
2192C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
5028\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeFluxus V7.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
5236"C:\Users\admin\Desktop\Fluxus-Roblox-Executor-main\Fluxus V7.exe" C:\Users\admin\Desktop\Fluxus-Roblox-Executor-main\Fluxus V7.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
black object organize.exe
Exit code:
0
Version:
8.7.5.2
5300C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
5572"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
Fluxus V7.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
aspnet_regiis.exe
Version:
4.8.9037.0 built by: NET481REL1
6596"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\Fluxus-Roblox-Executor-main.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
6848"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
Fluxus V7.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
aspnet_regiis.exe
Version:
4.8.9037.0 built by: NET481REL1
6948\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeFluxus V7.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
6956"C:\Users\admin\Desktop\Fluxus-Roblox-Executor-main\Fluxus V7.exe" C:\Users\admin\Desktop\Fluxus-Roblox-Executor-main\Fluxus V7.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
black object organize.exe
Exit code:
0
Version:
8.7.5.2
Total events
0
Read events
0
Write events
0
Delete events
0

Modification events

No data
Executable files
3
Suspicious files
2
Text files
22
Unknown types
0

Dropped files

PID
Process
Filename
Type
6596WinRAR.exeC:\Users\admin\Desktop\Fluxus-Roblox-Executor-main\Executor\Resources\icon.pngimage
MD5:73426CD15FD8F46363B84CFE166FE5F7
SHA256:34EC3A0B24ED9B4ADBBD7F75980542704BAA9FFD9C19721FC604B2D2A6E5AA53
6596WinRAR.exeC:\Users\admin\Desktop\Fluxus-Roblox-Executor-main\Executor\Properties\Resources.Designer.cstext
MD5:909904EDAB009F0054C2E63E0EF541C3
SHA256:AA021C1CFF6556F304103031BEC5145F575D28FECF6550F4F63C1FC0806FFBC5
6596WinRAR.exeC:\Users\admin\Desktop\Fluxus-Roblox-Executor-main\Executor\Properties\Settings.settingsxml
MD5:29A2BB6BD6F85FF04804C473E895DE92
SHA256:BABA99193FC1787141063B135424B476FF4151BEB833883FCB594631F17C0147
6596WinRAR.exeC:\Users\admin\Desktop\Fluxus-Roblox-Executor-main\Client\Executor.luabinary
MD5:C460F216DDBA7B3371CB75CE44E880F4
SHA256:C7C6BE85E49FA37A01E33F85BC67F2D886DCC813D5D33590A8F7394744C44A7E
6596WinRAR.exeC:\Users\admin\Desktop\Fluxus-Roblox-Executor-main\Executor\App.configxml
MD5:CC46A0995713BA7CB577B4BBBEDF83E8
SHA256:5FE1AD802F68D7C47DBBD8E60162BA88ABAED162DA5D381C85D3E4935311962E
6596WinRAR.exeC:\Users\admin\Desktop\Fluxus-Roblox-Executor-main\Executor\ScriptHub.Designer.cstext
MD5:40C24708A84EADAC4418329EF22D7AAE
SHA256:77B20F2FD70A530734B3CD1059CA08EA771F216F9F23434A181441C731C8AB4D
6596WinRAR.exeC:\Users\admin\Desktop\Fluxus-Roblox-Executor-main\Executor\UI.cstext
MD5:B3C05F018574AA07EC296FAFBA2B5581
SHA256:FDB325F9AC0755B31FD50F24359415DB3D94577C2469D5E2BF0688A3A06DED34
6596WinRAR.exeC:\Users\admin\Desktop\Fluxus-Roblox-Executor-main\Executor\Options.Designer.cstext
MD5:D9EC63727890650E25424447878A7F26
SHA256:1B0F2678AC3D46A9E9EB85024A582672EA67294924A7DE315356676B6E9EF609
6596WinRAR.exeC:\Users\admin\Desktop\Fluxus-Roblox-Executor-main\Executor\Properties\AssemblyInfo.cstext
MD5:28ADDFA6C9902ABB21B255A4390DACF3
SHA256:4A6313C09A5380520D4EA9F00A962D5570CA91E6A4729BC0264630C5C4391406
6596WinRAR.exeC:\Users\admin\Desktop\Fluxus-Roblox-Executor-main\Executor\Properties\Settings.Designer.cstext
MD5:210C0366028C8D7D600F97865F4EFF36
SHA256:0195B2BAD68B26160E5C8657A4977579EAABB8E699B7BF3391295B87B57837A0
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
44
DNS requests
17
Threats
13

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.37.237.227:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
GET
200
23.48.23.166:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.37.237.227:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1344
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
GET
200
23.48.23.166:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6404
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1344
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5064
SearchApp.exe
2.16.204.135:443
www.bing.com
Akamai International B.V.
DE
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
23.48.23.166:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
23.37.237.227:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
1176
svchost.exe
20.190.160.14:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1076
svchost.exe
23.35.238.131:443
go.microsoft.com
AKAMAI-AS
DE
whitelisted
4712
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.104.136.2
whitelisted
www.bing.com
  • 2.16.204.135
  • 2.16.204.148
  • 2.16.204.160
  • 2.16.204.155
  • 2.16.204.141
  • 2.16.204.161
  • 2.16.204.158
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
crl.microsoft.com
  • 23.48.23.166
  • 23.48.23.156
  • 23.48.23.143
whitelisted
www.microsoft.com
  • 23.37.237.227
  • 95.101.149.131
whitelisted
google.com
  • 142.250.184.206
whitelisted
login.live.com
  • 20.190.160.14
  • 40.126.32.68
  • 40.126.32.134
  • 40.126.32.133
  • 40.126.32.74
  • 20.190.160.22
  • 40.126.32.76
  • 20.190.160.17
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted
undesirabkel.click
  • 188.114.96.3
  • 188.114.97.3
malicious
arc.msn.com
  • 20.223.35.26
whitelisted

Threats

PID
Process
Class
Message
Domain Observed Used for C2 Detected
ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (undesirabkel .click)
6848
aspnet_regiis.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)
6848
aspnet_regiis.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)
6848
aspnet_regiis.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)
6848
aspnet_regiis.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)
6848
aspnet_regiis.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)
6848
aspnet_regiis.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)
5572
aspnet_regiis.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)
5572
aspnet_regiis.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)
5572
aspnet_regiis.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)
No debug info