Windows Analysis Report
172966478212513cde3d5493c177d435290785f3a4fca1fffe74765f23c478e822a6b7d3fa147.dat-decoded.exe

Overview

General Information

Sample name: 172966478212513cde3d5493c177d435290785f3a4fca1fffe74765f23c478e822a6b7d3fa147.dat-decoded.exe
Analysis ID: 1540043
MD5: 56eb70d67d2f55d52016224dee99c9ea
SHA1: bb1bf25fa03e493f188ac38c7a521820c23ee817
SHA256: 9b6675cf2786353f934721f973cc6c48425ec27be2a747b0c7abfb07f75af65f
Tags: base64-decodedexeuser-abuse_ch
Infos:
Errors
  • No process behavior to analyse as no analysis process or sample was found
  • Corrupt sample or wrongly selected analyzer. Details: %1 is not a valid Win32 application.

Detection

LummaC
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
LummaC encrypted strings found
PE file contains section with special chars
Sample uses string decryption to hide its real strings
PE file contains an invalid checksum
PE file contains sections with non-standard names
PE file does not import any functions
Uses 32bit PE files

Classification

Name Description Attribution Blogpost URLs Link
Lumma Stealer, LummaC2 Stealer Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/win.lumma

AV Detection

barindex
Source: 172966478212513cde3d5493c177d435290785f3a4fca1fffe74765f23c478e822a6b7d3fa147.dat-decoded.exe Avira: detected
Source: 172966478212513cde3d5493c177d435290785f3a4fca1fffe74765f23c478e822a6b7d3fa147.dat-decoded.exe Malware Configuration Extractor: LummaC {"C2 url": ["shepherdlyopzc.shop", "outpointsozp.shop", "unseaffarignsk.shop", "exmptiondixv.shop", "indexterityszcoxp.shop", "upknittsoappz.shop", "lariatedzugspd.shop", "liernessfornicsa.shop", "callosallsaospz.shop"], "Build id": "eFtdO8--"}
Source: 172966478212513cde3d5493c177d435290785f3a4fca1fffe74765f23c478e822a6b7d3fa147.dat-decoded.exe ReversingLabs: Detection: 23%
Source: Submited Sample Integrated Neural Analysis Model: Matched 95.5% probability
Source: 172966478212513cde3d5493c177d435290785f3a4fca1fffe74765f23c478e822a6b7d3fa147.dat-decoded.exe String decryptor: indexterityszcoxp.shop
Source: 172966478212513cde3d5493c177d435290785f3a4fca1fffe74765f23c478e822a6b7d3fa147.dat-decoded.exe String decryptor: lariatedzugspd.shop
Source: 172966478212513cde3d5493c177d435290785f3a4fca1fffe74765f23c478e822a6b7d3fa147.dat-decoded.exe String decryptor: callosallsaospz.shop
Source: 172966478212513cde3d5493c177d435290785f3a4fca1fffe74765f23c478e822a6b7d3fa147.dat-decoded.exe String decryptor: outpointsozp.shop
Source: 172966478212513cde3d5493c177d435290785f3a4fca1fffe74765f23c478e822a6b7d3fa147.dat-decoded.exe String decryptor: liernessfornicsa.shop
Source: 172966478212513cde3d5493c177d435290785f3a4fca1fffe74765f23c478e822a6b7d3fa147.dat-decoded.exe String decryptor: upknittsoappz.shop
Source: 172966478212513cde3d5493c177d435290785f3a4fca1fffe74765f23c478e822a6b7d3fa147.dat-decoded.exe String decryptor: shepherdlyopzc.shop
Source: 172966478212513cde3d5493c177d435290785f3a4fca1fffe74765f23c478e822a6b7d3fa147.dat-decoded.exe String decryptor: unseaffarignsk.shop
Source: 172966478212513cde3d5493c177d435290785f3a4fca1fffe74765f23c478e822a6b7d3fa147.dat-decoded.exe String decryptor: exmptiondixv.shop
Source: 172966478212513cde3d5493c177d435290785f3a4fca1fffe74765f23c478e822a6b7d3fa147.dat-decoded.exe String decryptor: lid=%s&j=%s&ver=4.0
Source: 172966478212513cde3d5493c177d435290785f3a4fca1fffe74765f23c478e822a6b7d3fa147.dat-decoded.exe String decryptor: TeslaBrowser/5.5
Source: 172966478212513cde3d5493c177d435290785f3a4fca1fffe74765f23c478e822a6b7d3fa147.dat-decoded.exe String decryptor: - Screen Resoluton:
Source: 172966478212513cde3d5493c177d435290785f3a4fca1fffe74765f23c478e822a6b7d3fa147.dat-decoded.exe String decryptor: - Physical Installed Memory:
Source: 172966478212513cde3d5493c177d435290785f3a4fca1fffe74765f23c478e822a6b7d3fa147.dat-decoded.exe String decryptor: Workgroup: -
Source: 172966478212513cde3d5493c177d435290785f3a4fca1fffe74765f23c478e822a6b7d3fa147.dat-decoded.exe String decryptor: eFtdO8--
Source: 172966478212513cde3d5493c177d435290785f3a4fca1fffe74765f23c478e822a6b7d3fa147.dat-decoded.exe Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE

Networking

barindex
Source: Malware configuration extractor URLs: shepherdlyopzc.shop
Source: Malware configuration extractor URLs: outpointsozp.shop
Source: Malware configuration extractor URLs: unseaffarignsk.shop
Source: Malware configuration extractor URLs: exmptiondixv.shop
Source: Malware configuration extractor URLs: indexterityszcoxp.shop
Source: Malware configuration extractor URLs: upknittsoappz.shop
Source: Malware configuration extractor URLs: lariatedzugspd.shop
Source: Malware configuration extractor URLs: liernessfornicsa.shop
Source: Malware configuration extractor URLs: callosallsaospz.shop

System Summary

barindex
Source: 172966478212513cde3d5493c177d435290785f3a4fca1fffe74765f23c478e822a6b7d3fa147.dat-decoded.exe Static PE information: section name: `.rdat
Source: 172966478212513cde3d5493c177d435290785f3a4fca1fffe74765f23c478e822a6b7d3fa147.dat-decoded.exe Static PE information: section name: @.data
Source: 172966478212513cde3d5493c177d435290785f3a4fca1fffe74765f23c478e822a6b7d3fa147.dat-decoded.exe Static PE information: No import functions for PE file found
Source: 172966478212513cde3d5493c177d435290785f3a4fca1fffe74765f23c478e822a6b7d3fa147.dat-decoded.exe Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: 172966478212513cde3d5493c177d435290785f3a4fca1fffe74765f23c478e822a6b7d3fa147.dat-decoded.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC size: 0xe8000500 address: 0x0
Source: classification engine Classification label: mal100.troj.evad.winEXE@0/0@0/0
Source: 172966478212513cde3d5493c177d435290785f3a4fca1fffe74765f23c478e822a6b7d3fa147.dat-decoded.exe Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE
Source: 172966478212513cde3d5493c177d435290785f3a4fca1fffe74765f23c478e822a6b7d3fa147.dat-decoded.exe ReversingLabs: Detection: 23%
Source: 172966478212513cde3d5493c177d435290785f3a4fca1fffe74765f23c478e822a6b7d3fa147.dat-decoded.exe Static PE information: Virtual size of .text is bigger than: 0x100000
Source: 172966478212513cde3d5493c177d435290785f3a4fca1fffe74765f23c478e822a6b7d3fa147.dat-decoded.exe Static PE information: real checksum: 0x4 should be: 0x53ec5
Source: 172966478212513cde3d5493c177d435290785f3a4fca1fffe74765f23c478e822a6b7d3fa147.dat-decoded.exe Static PE information: section name: `.rdat
Source: 172966478212513cde3d5493c177d435290785f3a4fca1fffe74765f23c478e822a6b7d3fa147.dat-decoded.exe Static PE information: section name: .relo
Source: 172966478212513cde3d5493c177d435290785f3a4fca1fffe74765f23c478e822a6b7d3fa147.dat-decoded.exe Static PE information: section name: @.data

HIPS / PFW / Operating System Protection Evasion

barindex
Source: 172966478212513cde3d5493c177d435290785f3a4fca1fffe74765f23c478e822a6b7d3fa147.dat-decoded.exe String found in binary or memory: indexterityszcoxp.shop
Source: 172966478212513cde3d5493c177d435290785f3a4fca1fffe74765f23c478e822a6b7d3fa147.dat-decoded.exe String found in binary or memory: lariatedzugspd.shop
Source: 172966478212513cde3d5493c177d435290785f3a4fca1fffe74765f23c478e822a6b7d3fa147.dat-decoded.exe String found in binary or memory: callosallsaospz.shop
Source: 172966478212513cde3d5493c177d435290785f3a4fca1fffe74765f23c478e822a6b7d3fa147.dat-decoded.exe String found in binary or memory: outpointsozp.shop
Source: 172966478212513cde3d5493c177d435290785f3a4fca1fffe74765f23c478e822a6b7d3fa147.dat-decoded.exe String found in binary or memory: liernessfornicsa.shop
Source: 172966478212513cde3d5493c177d435290785f3a4fca1fffe74765f23c478e822a6b7d3fa147.dat-decoded.exe String found in binary or memory: upknittsoappz.shop
Source: 172966478212513cde3d5493c177d435290785f3a4fca1fffe74765f23c478e822a6b7d3fa147.dat-decoded.exe String found in binary or memory: shepherdlyopzc.shop
Source: 172966478212513cde3d5493c177d435290785f3a4fca1fffe74765f23c478e822a6b7d3fa147.dat-decoded.exe String found in binary or memory: unseaffarignsk.shop
Source: 172966478212513cde3d5493c177d435290785f3a4fca1fffe74765f23c478e822a6b7d3fa147.dat-decoded.exe String found in binary or memory: exmptiondixv.shop

Stealing of Sensitive Information

barindex
Source: Yara match File source: decrypted.binstr, type: MEMORYSTR
Source: Yara match File source: 172966478212513cde3d5493c177d435290785f3a4fca1fffe74765f23c478e822a6b7d3fa147.dat-decoded.exe, type: SAMPLE

Remote Access Functionality

barindex
Source: Yara match File source: decrypted.binstr, type: MEMORYSTR
Source: Yara match File source: 172966478212513cde3d5493c177d435290785f3a4fca1fffe74765f23c478e822a6b7d3fa147.dat-decoded.exe, type: SAMPLE
No contacted IP infos