download:

/files/ber.exe

Full analysis: https://app.any.run/tasks/3492c7a3-5df8-443a-ad3c-63d24165e56d
Verdict: Malicious activity
Threats:

Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat.

Analysis date: August 01, 2024, 00:48:54
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
lumma
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

40B5CFE2FF96CD0F16A0AF393AC8B039

SHA1:

464758984D5D5F6BDC7C2A83800E16CE2B9915B9

SHA256:

FBB0F6F5D7F6482D15CA97B8500806D9AFF10A82EBC555E1BEB4644159C3DA07

SSDEEP:

6144:+sc81sXWbnbRRu9j9BOe3C4hyi1/wowQ77CoFbG2S0Ym9T6:+scqbnbRRu95BOeSxYIoHCoFbG2S0Ym

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • ber.exe (PID: 6652)
    • LUMMA has been detected (YARA)

      • ber.exe (PID: 6652)
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Checks supported languages

      • ber.exe (PID: 6652)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Lumma

(PID) Process(6652) ber.exe
C2 (8)ammycanedpors.shop
chequedxmznp.shop
triallyforwhgh.shop
egorepetiiiosn.shop
shelterryujxo.shop
shootydowtqosm.shop
illnesmunxkza.shop
faceddullinhs.shop
No Malware configuration.

TRiD

.exe | Generic Win/DOS Executable (50)
.exe | DOS Executable Generic (49.9)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:07:29 14:45:07+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14
CodeSize: 246784
InitializedDataSize: 57344
UninitializedDataSize: -
EntryPoint: 0x99f0
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
115
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #LUMMA ber.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
6652"C:\Users\admin\AppData\Local\Temp\ber.exe" C:\Users\admin\AppData\Local\Temp\ber.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\ber.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ole32.dll
Lumma
(PID) Process(6652) ber.exe
C2 (8)ammycanedpors.shop
chequedxmznp.shop
triallyforwhgh.shop
egorepetiiiosn.shop
shelterryujxo.shop
shootydowtqosm.shop
illnesmunxkza.shop
faceddullinhs.shop
Total events
19
Read events
19
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

No data
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
21
DNS requests
3
Threats
2

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3028
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4
System
192.168.100.255:138
whitelisted
3888
svchost.exe
239.255.255.250:1900
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4324
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
3028
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 4.231.128.59
whitelisted
google.com
  • 142.250.186.142
whitelisted

Threats

PID
Process
Class
Message
Generic Protocol Command Decode
SURICATA STREAM suspected RST injection
Generic Protocol Command Decode
SURICATA STREAM suspected RST injection
No debug info