Windows Analysis Report
1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe

Overview

General Information

Sample name: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe
Analysis ID: 1540046
MD5: 372ee7c999fd8e58d0e26d7955ff8bab
SHA1: f0e522b300d680cb6dd1066c20ab11958df6c6e9
SHA256: 74ad50c2a48ee0dd34271d9ba2fea8a347e90e300dd74bf32a496a880044a6a7
Tags: base64-decodedexeuser-abuse_ch
Infos:
Errors
  • No process behavior to analyse as no analysis process or sample was found
  • Corrupt sample or wrongly selected analyzer. Details: %1 is not a valid Win32 application.

Detection

LummaC
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected LummaC Stealer
C2 URLs / IPs found in malware configuration
LummaC encrypted strings found
Machine Learning detection for sample
PE file contains section with special chars
Sample uses string decryption to hide its real strings
Entry point lies outside standard sections
PE file contains an invalid checksum
PE file contains sections with non-standard names
PE file does not import any functions
Uses 32bit PE files

Classification

Name Description Attribution Blogpost URLs Link
Lumma Stealer, LummaC2 Stealer Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/win.lumma

AV Detection

barindex
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe Avira: detected
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe Malware Configuration Extractor: LummaC {"C2 url": ["radiationnopp.shop", "bouncedgowp.shop", "publicitttyps.shop", "bannngwko.shop", "benchillppwo.shop", "bargainnykwo.shop", "answerrsdo.shop", "affecthorsedpo.shop"], "Build id": "eFtdO8--"}
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe ReversingLabs: Detection: 13%
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe Joe Sandbox ML: detected
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe String decryptor: benchillppwo.shop
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe String decryptor: publicitttyps.shop
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe String decryptor: answerrsdo.shop
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe String decryptor: radiationnopp.shop
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe String decryptor: affecthorsedpo.shop
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe String decryptor: bargainnykwo.shop
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe String decryptor: bannngwko.shop
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe String decryptor: bouncedgowp.shop
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe String decryptor: benchillppwo.shop
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe String decryptor: lid=%s&j=%s&ver=4.0
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe String decryptor: TeslaBrowser/5.5
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe String decryptor: - Screen Resoluton:
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe String decryptor: - Physical Installed Memory:
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe String decryptor: Workgroup: -
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe String decryptor: eFtdO8--
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE

Networking

barindex
Source: Malware configuration extractor URLs: radiationnopp.shop
Source: Malware configuration extractor URLs: bouncedgowp.shop
Source: Malware configuration extractor URLs: publicitttyps.shop
Source: Malware configuration extractor URLs: bannngwko.shop
Source: Malware configuration extractor URLs: benchillppwo.shop
Source: Malware configuration extractor URLs: bargainnykwo.shop
Source: Malware configuration extractor URLs: answerrsdo.shop
Source: Malware configuration extractor URLs: affecthorsedpo.shop

System Summary

barindex
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe Static PE information: section name: `.rdat
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe Static PE information: section name: @.data
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe Static PE information: No import functions for PE file found
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC size: 0xd0000520 address: 0x0
Source: classification engine Classification label: mal100.troj.evad.winEXE@0/0@0/0
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe ReversingLabs: Detection: 13%
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe Static PE information: Virtual size of .text is bigger than: 0x100000
Source: initial sample Static PE information: section where entry point is pointing to: .relo
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe Static PE information: real checksum: 0x4 should be: 0x5d9a1
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe Static PE information: section name: `.rdat
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe Static PE information: section name: .relo
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe Static PE information: section name: @.data

HIPS / PFW / Operating System Protection Evasion

barindex
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe String found in binary or memory: benchillppwo.shop
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe String found in binary or memory: publicitttyps.shop
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe String found in binary or memory: answerrsdo.shop
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe String found in binary or memory: radiationnopp.shop
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe String found in binary or memory: affecthorsedpo.shop
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe String found in binary or memory: bargainnykwo.shop
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe String found in binary or memory: bannngwko.shop
Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe String found in binary or memory: bouncedgowp.shop

Stealing of Sensitive Information

barindex
Source: Yara match File source: decrypted.binstr, type: MEMORYSTR
Source: Yara match File source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe, type: SAMPLE

Remote Access Functionality

barindex
Source: Yara match File source: decrypted.binstr, type: MEMORYSTR
Source: Yara match File source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe, type: SAMPLE
No contacted IP infos