Windows Analysis Report
1729664799fd841a8c62d4c43fb7c0c48211664bfbdd95dbdc2c99de2ed0cddefff2ee8a7e983.dat-decoded.exe

Overview

General Information

Sample name: 1729664799fd841a8c62d4c43fb7c0c48211664bfbdd95dbdc2c99de2ed0cddefff2ee8a7e983.dat-decoded.exe
Analysis ID: 1540040
MD5: c07099dce8588679d863aeae45387398
SHA1: 15031249127e00c54aa44fc4985ab888b272bc16
SHA256: 7db82c48f73aa372391631b90187c5b7dff3a36644b85b285fc3fe992bcb8eb9
Tags: base64-decodedexeuser-abuse_ch
Infos:
Errors
  • No process behavior to analyse as no analysis process or sample was found
  • Corrupt sample or wrongly selected analyzer. Details: %1 is not a valid Win32 application.

Detection

LummaC
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
LummaC encrypted strings found
PE file contains section with special chars
Sample uses string decryption to hide its real strings
PE file contains an invalid checksum
PE file contains sections with non-standard names
PE file does not import any functions
Uses 32bit PE files

Classification

Name Description Attribution Blogpost URLs Link
Lumma Stealer, LummaC2 Stealer Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/win.lumma

AV Detection

barindex
Source: 1729664799fd841a8c62d4c43fb7c0c48211664bfbdd95dbdc2c99de2ed0cddefff2ee8a7e983.dat-decoded.exe Avira: detected
Source: 1729664799fd841a8c62d4c43fb7c0c48211664bfbdd95dbdc2c99de2ed0cddefff2ee8a7e983.dat-decoded.exe Malware Configuration Extractor: LummaC {"C2 url": ["outpointsozp.shop", "upknittsoappz.shop", "negotationpxczp.shop", "liernessfornicsa.shop", "shepherdlyopzc.shop", "unseaffarignsk.shop", "callosallsaospz.shop", "indexterityszcoxp.shop", "lariatedzugspd.shop"], "Build id": "RKiJ2s--new1"}
Source: 1729664799fd841a8c62d4c43fb7c0c48211664bfbdd95dbdc2c99de2ed0cddefff2ee8a7e983.dat-decoded.exe ReversingLabs: Detection: 23%
Source: Submited Sample Integrated Neural Analysis Model: Matched 95.5% probability
Source: 1729664799fd841a8c62d4c43fb7c0c48211664bfbdd95dbdc2c99de2ed0cddefff2ee8a7e983.dat-decoded.exe String decryptor: indexterityszcoxp.shop
Source: 1729664799fd841a8c62d4c43fb7c0c48211664bfbdd95dbdc2c99de2ed0cddefff2ee8a7e983.dat-decoded.exe String decryptor: lariatedzugspd.shop
Source: 1729664799fd841a8c62d4c43fb7c0c48211664bfbdd95dbdc2c99de2ed0cddefff2ee8a7e983.dat-decoded.exe String decryptor: callosallsaospz.shop
Source: 1729664799fd841a8c62d4c43fb7c0c48211664bfbdd95dbdc2c99de2ed0cddefff2ee8a7e983.dat-decoded.exe String decryptor: outpointsozp.shop
Source: 1729664799fd841a8c62d4c43fb7c0c48211664bfbdd95dbdc2c99de2ed0cddefff2ee8a7e983.dat-decoded.exe String decryptor: liernessfornicsa.shop
Source: 1729664799fd841a8c62d4c43fb7c0c48211664bfbdd95dbdc2c99de2ed0cddefff2ee8a7e983.dat-decoded.exe String decryptor: upknittsoappz.shop
Source: 1729664799fd841a8c62d4c43fb7c0c48211664bfbdd95dbdc2c99de2ed0cddefff2ee8a7e983.dat-decoded.exe String decryptor: shepherdlyopzc.shop
Source: 1729664799fd841a8c62d4c43fb7c0c48211664bfbdd95dbdc2c99de2ed0cddefff2ee8a7e983.dat-decoded.exe String decryptor: unseaffarignsk.shop
Source: 1729664799fd841a8c62d4c43fb7c0c48211664bfbdd95dbdc2c99de2ed0cddefff2ee8a7e983.dat-decoded.exe String decryptor: negotationpxczp.shop
Source: 1729664799fd841a8c62d4c43fb7c0c48211664bfbdd95dbdc2c99de2ed0cddefff2ee8a7e983.dat-decoded.exe String decryptor: lid=%s&j=%s&ver=4.0
Source: 1729664799fd841a8c62d4c43fb7c0c48211664bfbdd95dbdc2c99de2ed0cddefff2ee8a7e983.dat-decoded.exe String decryptor: TeslaBrowser/5.5
Source: 1729664799fd841a8c62d4c43fb7c0c48211664bfbdd95dbdc2c99de2ed0cddefff2ee8a7e983.dat-decoded.exe String decryptor: - Screen Resoluton:
Source: 1729664799fd841a8c62d4c43fb7c0c48211664bfbdd95dbdc2c99de2ed0cddefff2ee8a7e983.dat-decoded.exe String decryptor: - Physical Installed Memory:
Source: 1729664799fd841a8c62d4c43fb7c0c48211664bfbdd95dbdc2c99de2ed0cddefff2ee8a7e983.dat-decoded.exe String decryptor: Workgroup: -
Source: 1729664799fd841a8c62d4c43fb7c0c48211664bfbdd95dbdc2c99de2ed0cddefff2ee8a7e983.dat-decoded.exe String decryptor: RKiJ2s--new1
Source: 1729664799fd841a8c62d4c43fb7c0c48211664bfbdd95dbdc2c99de2ed0cddefff2ee8a7e983.dat-decoded.exe Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE

Networking

barindex
Source: Malware configuration extractor URLs: outpointsozp.shop
Source: Malware configuration extractor URLs: upknittsoappz.shop
Source: Malware configuration extractor URLs: negotationpxczp.shop
Source: Malware configuration extractor URLs: liernessfornicsa.shop
Source: Malware configuration extractor URLs: shepherdlyopzc.shop
Source: Malware configuration extractor URLs: unseaffarignsk.shop
Source: Malware configuration extractor URLs: callosallsaospz.shop
Source: Malware configuration extractor URLs: indexterityszcoxp.shop
Source: Malware configuration extractor URLs: lariatedzugspd.shop

System Summary

barindex
Source: 1729664799fd841a8c62d4c43fb7c0c48211664bfbdd95dbdc2c99de2ed0cddefff2ee8a7e983.dat-decoded.exe Static PE information: section name: `.rdat
Source: 1729664799fd841a8c62d4c43fb7c0c48211664bfbdd95dbdc2c99de2ed0cddefff2ee8a7e983.dat-decoded.exe Static PE information: section name: @.data
Source: 1729664799fd841a8c62d4c43fb7c0c48211664bfbdd95dbdc2c99de2ed0cddefff2ee8a7e983.dat-decoded.exe Static PE information: No import functions for PE file found
Source: 1729664799fd841a8c62d4c43fb7c0c48211664bfbdd95dbdc2c99de2ed0cddefff2ee8a7e983.dat-decoded.exe Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: 1729664799fd841a8c62d4c43fb7c0c48211664bfbdd95dbdc2c99de2ed0cddefff2ee8a7e983.dat-decoded.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC size: 0xe8000500 address: 0x0
Source: classification engine Classification label: mal100.troj.evad.winEXE@0/0@0/0
Source: 1729664799fd841a8c62d4c43fb7c0c48211664bfbdd95dbdc2c99de2ed0cddefff2ee8a7e983.dat-decoded.exe Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE
Source: 1729664799fd841a8c62d4c43fb7c0c48211664bfbdd95dbdc2c99de2ed0cddefff2ee8a7e983.dat-decoded.exe ReversingLabs: Detection: 23%
Source: 1729664799fd841a8c62d4c43fb7c0c48211664bfbdd95dbdc2c99de2ed0cddefff2ee8a7e983.dat-decoded.exe Static PE information: Virtual size of .text is bigger than: 0x100000
Source: 1729664799fd841a8c62d4c43fb7c0c48211664bfbdd95dbdc2c99de2ed0cddefff2ee8a7e983.dat-decoded.exe Static PE information: real checksum: 0x4 should be: 0x586ad
Source: 1729664799fd841a8c62d4c43fb7c0c48211664bfbdd95dbdc2c99de2ed0cddefff2ee8a7e983.dat-decoded.exe Static PE information: section name: `.rdat
Source: 1729664799fd841a8c62d4c43fb7c0c48211664bfbdd95dbdc2c99de2ed0cddefff2ee8a7e983.dat-decoded.exe Static PE information: section name: .relo
Source: 1729664799fd841a8c62d4c43fb7c0c48211664bfbdd95dbdc2c99de2ed0cddefff2ee8a7e983.dat-decoded.exe Static PE information: section name: @.data

HIPS / PFW / Operating System Protection Evasion

barindex
Source: 1729664799fd841a8c62d4c43fb7c0c48211664bfbdd95dbdc2c99de2ed0cddefff2ee8a7e983.dat-decoded.exe String found in binary or memory: indexterityszcoxp.shop
Source: 1729664799fd841a8c62d4c43fb7c0c48211664bfbdd95dbdc2c99de2ed0cddefff2ee8a7e983.dat-decoded.exe String found in binary or memory: lariatedzugspd.shop
Source: 1729664799fd841a8c62d4c43fb7c0c48211664bfbdd95dbdc2c99de2ed0cddefff2ee8a7e983.dat-decoded.exe String found in binary or memory: callosallsaospz.shop
Source: 1729664799fd841a8c62d4c43fb7c0c48211664bfbdd95dbdc2c99de2ed0cddefff2ee8a7e983.dat-decoded.exe String found in binary or memory: outpointsozp.shop
Source: 1729664799fd841a8c62d4c43fb7c0c48211664bfbdd95dbdc2c99de2ed0cddefff2ee8a7e983.dat-decoded.exe String found in binary or memory: liernessfornicsa.shop
Source: 1729664799fd841a8c62d4c43fb7c0c48211664bfbdd95dbdc2c99de2ed0cddefff2ee8a7e983.dat-decoded.exe String found in binary or memory: upknittsoappz.shop
Source: 1729664799fd841a8c62d4c43fb7c0c48211664bfbdd95dbdc2c99de2ed0cddefff2ee8a7e983.dat-decoded.exe String found in binary or memory: shepherdlyopzc.shop
Source: 1729664799fd841a8c62d4c43fb7c0c48211664bfbdd95dbdc2c99de2ed0cddefff2ee8a7e983.dat-decoded.exe String found in binary or memory: unseaffarignsk.shop
Source: 1729664799fd841a8c62d4c43fb7c0c48211664bfbdd95dbdc2c99de2ed0cddefff2ee8a7e983.dat-decoded.exe String found in binary or memory: negotationpxczp.shop

Stealing of Sensitive Information

barindex
Source: Yara match File source: decrypted.binstr, type: MEMORYSTR
Source: Yara match File source: 1729664799fd841a8c62d4c43fb7c0c48211664bfbdd95dbdc2c99de2ed0cddefff2ee8a7e983.dat-decoded.exe, type: SAMPLE

Remote Access Functionality

barindex
Source: Yara match File source: decrypted.binstr, type: MEMORYSTR
Source: Yara match File source: 1729664799fd841a8c62d4c43fb7c0c48211664bfbdd95dbdc2c99de2ed0cddefff2ee8a7e983.dat-decoded.exe, type: SAMPLE
No contacted IP infos