| File name: | Elektrius.exe |
| Full analysis: | https://app.any.run/tasks/e36e3d58-4805-4e0f-a546-a671d3e602ac |
| Verdict: | Malicious activity |
| Threats: | Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat. |
| Analysis date: | March 24, 2025, 03:02:57 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections |
| MD5: | 1A73ED0DE709E84C1D853FE2DB12480D |
| SHA1: | 33C0A0FA66B6E2AD4611580492171E12F4DEC2F7 |
| SHA256: | AD26040171AD3CF68F4DB6C3E72D177518008BF93467503C22D501267D1A1293 |
| SSDEEP: | 49152:paYikUgDXKjRcr/SHq9luGdXsPMdirhgAwsMBjI5OnZcaXvfF+jSLgBATOOUqaSs:3XX/SKDvOXh0/JlnZLv9DgBATOFqaS1m |
| .exe | | | Win32 Executable MS Visual C++ (generic) (67.4) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (14.2) |
| .exe | | | Win32 Executable (generic) (9.7) |
| .exe | | | Generic Win/DOS Executable (4.3) |
| .exe | | | DOS Executable Generic (4.3) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2021:09:25 21:53:44+00:00 |
| ImageFileCharacteristics: | No relocs, Executable, No line numbers, No symbols, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 6 |
| CodeSize: | 26624 |
| InitializedDataSize: | 3806720 |
| UninitializedDataSize: | 2048 |
| EntryPoint: | 0x350a |
| OSVersion: | 4 |
| ImageVersion: | 6 |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 5.1.4.4 |
| ProductVersionNumber: | 5.1.4.4 |
| FileFlagsMask: | 0x0000 |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| CompanyName: | Elektrius LLC |
| FileDescription: | Unified library of game modifications. |
| FileVersion: | 1.1 |
| InternalName: | Elektrius |
| LegalCopyright: | Copyright (C) 2024-2025 Elektrius LLC. All rights reserved. |
| OriginalFileName: | Elektrius.exe |
| ProductName: | Elektrius |
| ProductVersion: | 1.1 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 664 | cmd /c copy /b ..\Dat.flv + ..\Geometry.flv + ..\Ga.flv + ..\Calculation.flv + ..\Pole.flv + ..\Bernard.flv + ..\Greensboro.flv + ..\Richard.flv q | C:\Windows\SysWOW64\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 728 | choice /d y /t 5 | C:\Windows\SysWOW64\choice.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Offers the user a choice Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 812 | findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn" | C:\Windows\SysWOW64\findstr.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Find String (QGREP) Utility Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2340 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2564 | cmd /c md 582573 | C:\Windows\SysWOW64\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4112 | findstr /V "detect" Testimony | C:\Windows\SysWOW64\findstr.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Find String (QGREP) Utility Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4400 | Castle.com q | C:\Users\admin\AppData\Local\Temp\582573\Castle.com | cmd.exe | ||||||||||||
User: admin Company: AutoIt Team Integrity Level: MEDIUM Description: AutoIt v3 Script (Beta) Version: 3, 3, 15, 5 Modules
| |||||||||||||||
| 4436 | tasklist | C:\Windows\SysWOW64\tasklist.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Lists the current running tasks Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4608 | cmd /c copy /b 582573\Castle.com + Isaac + Flight + About + Saddam + Revenge + Surgeon + Sperm + Tex + Touch + Many 582573\Castle.com | C:\Windows\SysWOW64\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4696 | expand Functional.flv Functional.flv.bat | C:\Windows\SysWOW64\expand.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: LZ Expansion Utility Exit code: 0 Version: 5.00 (WinBuild.160101.0800) Modules
| |||||||||||||||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 5112 | Elektrius.exe | C:\Users\admin\AppData\Local\Temp\Geometry.flv | binary | |
MD5:DE6DCCBB35B77C7F501C566382FD2990 | SHA256:9D39FA5D6E2300DCDE92E65CE1CA22FFA674E106C3E8878E110F28389E0268CD | |||
| 5112 | Elektrius.exe | C:\Users\admin\AppData\Local\Temp\Richard.flv | binary | |
MD5:27D07C77F67DC2E10A577F8C9C2931A9 | SHA256:D16B2E83F87B6D76775245D8C8CF8326734E5004EA8E5827BABF4680436FEF53 | |||
| 5112 | Elektrius.exe | C:\Users\admin\AppData\Local\Temp\Calculation.flv | binary | |
MD5:1B1BA9D4EDF27BB4DB24153F4CF75167 | SHA256:10D1986321C72A60FFDAD10877C1A30B650FEC203231824BE0B2B3243EA92A1C | |||
| 5112 | Elektrius.exe | C:\Users\admin\AppData\Local\Temp\Ga.flv | binary | |
MD5:A0EA96F736CAAA78F6B3B9BFB6E8A967 | SHA256:E8F22D1162D5BD67630BE5499852D4C9AE31BF0449AA65CF272B0B7239684F1B | |||
| 5112 | Elektrius.exe | C:\Users\admin\AppData\Local\Temp\Greensboro.flv | binary | |
MD5:069F97C19F82982012633883B5A16451 | SHA256:006F66886FB889E0C3945FC89AADC524105F7F428E69DFDB2314B921BF5AA2D1 | |||
| 5112 | Elektrius.exe | C:\Users\admin\AppData\Local\Temp\Laundry.flv | compressed | |
MD5:29BB0AD72D6389D826C71AF7B534115A | SHA256:821F30B53C37261DD26EBA56AE53E11DFA04405DE206AD2F462B7E4D35D7AFC1 | |||
| 5112 | Elektrius.exe | C:\Users\admin\AppData\Local\Temp\Pole.flv | binary | |
MD5:C454CF4F7A4C95252CECC34B8C7D2B1D | SHA256:9FDD6E2045651BBA940E7B74457A46713441D0AEF0BAC626431B8A43C327A84F | |||
| 6032 | extrac32.exe | C:\Users\admin\AppData\Local\Temp\Touch | binary | |
MD5:2F5D78560621A84BD03BE0F009B33653 | SHA256:7DF5366C3903B37779B92966A4DAEC3A64E3193AE26F094FAA12313BF1E79CC0 | |||
| 6032 | extrac32.exe | C:\Users\admin\AppData\Local\Temp\Tex | binary | |
MD5:FE5206FCA4AAE480B7E06C6FE6600EA4 | SHA256:BF6137157D0A328EB0946232DE257FB59D1DD743D81D1E2376A1C4DB95E09AD0 | |||
| 6032 | extrac32.exe | C:\Users\admin\AppData\Local\Temp\Saddam | binary | |
MD5:A6BFBFD97219956F868A17052F9C1B3E | SHA256:5C1299B34FBAF4899BAA9BE94BD4B9CEAD9FCD01113C30CE70E6C73D719E525D | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2104 | svchost.exe | GET | 200 | 2.16.164.72:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
— | — | POST | 200 | 104.21.38.122:443 | https://atirflee.world/KEnsj | unknown | binary | 69 b | — |
— | — | POST | 200 | 172.67.222.162:443 | https://atirflee.world/KEnsj | unknown | binary | 69 b | — |
— | — | POST | 200 | 172.67.222.162:443 | https://atirflee.world/KEnsj | unknown | binary | 69 b | — |
— | — | POST | 200 | 104.21.38.122:443 | https://atirflee.world/KEnsj | unknown | binary | 32.8 Kb | — |
— | — | POST | 200 | 104.21.38.122:443 | https://atirflee.world/KEnsj | unknown | binary | 69 b | — |
— | — | POST | 200 | 172.67.222.162:443 | https://atirflee.world/KEnsj | unknown | binary | 69 b | — |
— | — | POST | 500 | 20.83.72.98:443 | https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail | unknown | xml | 512 b | whitelisted |
— | — | POST | 500 | 20.83.72.98:443 | https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail | unknown | xml | 512 b | whitelisted |
— | — | POST | 200 | 104.21.38.122:443 | https://atirflee.world/KEnsj | unknown | binary | 10.1 Kb | — |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
2104 | svchost.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
— | — | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
2104 | svchost.exe | 2.16.164.72:80 | crl.microsoft.com | Akamai International B.V. | NL | whitelisted |
2104 | svchost.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4400 | Castle.com | 172.67.222.162:443 | atirflee.world | CLOUDFLARENET | US | unknown |
6436 | slui.exe | 40.91.76.224:443 | activation-v2.sls.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
2340 | slui.exe | 40.91.76.224:443 | activation-v2.sls.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
IMZGNLfCsfJxaXiecmt.IMZGNLfCsfJxaXiecmt |
| unknown |
atirflee.world |
| unknown |
activation-v2.sls.microsoft.com |
| whitelisted |