Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe

Overview

General Information

Sample name:1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe
Analysis ID:1540046
MD5:372ee7c999fd8e58d0e26d7955ff8bab
SHA1:f0e522b300d680cb6dd1066c20ab11958df6c6e9
SHA256:74ad50c2a48ee0dd34271d9ba2fea8a347e90e300dd74bf32a496a880044a6a7
Tags:base64-decodedexeuser-abuse_ch
Infos:
Errors
  • No process behavior to analyse as no analysis process or sample was found
  • Corrupt sample or wrongly selected analyzer. Details: %1 is not a valid Win32 application.

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected LummaC Stealer
C2 URLs / IPs found in malware configuration
LummaC encrypted strings found
Machine Learning detection for sample
PE file contains section with special chars
Sample uses string decryption to hide its real strings
Entry point lies outside standard sections
PE file contains an invalid checksum
PE file contains sections with non-standard names
PE file does not import any functions
Uses 32bit PE files

Classification

NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["radiationnopp.shop", "bouncedgowp.shop", "publicitttyps.shop", "bannngwko.shop", "benchillppwo.shop", "bargainnykwo.shop", "answerrsdo.shop", "affecthorsedpo.shop"], "Build id": "eFtdO8--"}
SourceRuleDescriptionAuthorStrings
1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exeJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    decrypted.binstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      No Sigma rule has matched
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exeAvira: detected
      Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exeMalware Configuration Extractor: LummaC {"C2 url": ["radiationnopp.shop", "bouncedgowp.shop", "publicitttyps.shop", "bannngwko.shop", "benchillppwo.shop", "bargainnykwo.shop", "answerrsdo.shop", "affecthorsedpo.shop"], "Build id": "eFtdO8--"}
      Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exeReversingLabs: Detection: 13%
      Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exeJoe Sandbox ML: detected
      Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exeString decryptor: benchillppwo.shop
      Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exeString decryptor: publicitttyps.shop
      Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exeString decryptor: answerrsdo.shop
      Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exeString decryptor: radiationnopp.shop
      Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exeString decryptor: affecthorsedpo.shop
      Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exeString decryptor: bargainnykwo.shop
      Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exeString decryptor: bannngwko.shop
      Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exeString decryptor: bouncedgowp.shop
      Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exeString decryptor: benchillppwo.shop
      Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exeString decryptor: lid=%s&j=%s&ver=4.0
      Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exeString decryptor: TeslaBrowser/5.5
      Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exeString decryptor: - Screen Resoluton:
      Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exeString decryptor: - Physical Installed Memory:
      Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exeString decryptor: Workgroup: -
      Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exeString decryptor: eFtdO8--
      Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE

      Networking

      barindex
      Source: Malware configuration extractorURLs: radiationnopp.shop
      Source: Malware configuration extractorURLs: bouncedgowp.shop
      Source: Malware configuration extractorURLs: publicitttyps.shop
      Source: Malware configuration extractorURLs: bannngwko.shop
      Source: Malware configuration extractorURLs: benchillppwo.shop
      Source: Malware configuration extractorURLs: bargainnykwo.shop
      Source: Malware configuration extractorURLs: answerrsdo.shop
      Source: Malware configuration extractorURLs: affecthorsedpo.shop

      System Summary

      barindex
      Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exeStatic PE information: section name: `.rdat
      Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exeStatic PE information: section name: @.data
      Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exeStatic PE information: No import functions for PE file found
      Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC size: 0xd0000520 address: 0x0
      Source: classification engineClassification label: mal100.troj.evad.winEXE@0/0@0/0
      Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE
      Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exeReversingLabs: Detection: 13%
      Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
      Source: initial sampleStatic PE information: section where entry point is pointing to: .relo
      Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exeStatic PE information: real checksum: 0x4 should be: 0x5d9a1
      Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exeStatic PE information: section name: `.rdat
      Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exeStatic PE information: section name: .relo
      Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exeStatic PE information: section name: @.data

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exeString found in binary or memory: benchillppwo.shop
      Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exeString found in binary or memory: publicitttyps.shop
      Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exeString found in binary or memory: answerrsdo.shop
      Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exeString found in binary or memory: radiationnopp.shop
      Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exeString found in binary or memory: affecthorsedpo.shop
      Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exeString found in binary or memory: bargainnykwo.shop
      Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exeString found in binary or memory: bannngwko.shop
      Source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exeString found in binary or memory: bouncedgowp.shop

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: decrypted.binstr, type: MEMORYSTR
      Source: Yara matchFile source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe, type: SAMPLE

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: decrypted.binstr, type: MEMORYSTR
      Source: Yara matchFile source: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe, type: SAMPLE
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      PowerShell
      Path InterceptionPath Interception1
      Deobfuscate/Decode Files or Information
      OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
      Application Layer Protocol
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe13%ReversingLabsWin32.Packed.Lumma
      1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe100%AviraTR/Crypt.XPACK.Gen
      1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe100%Joe Sandbox ML
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      NameIPActiveMaliciousAntivirus DetectionReputation
      s-part-0017.t-0009.fb-t-msedge.net
      13.107.253.45
      truefalse
        unknown
        NameMaliciousAntivirus DetectionReputation
        benchillppwo.shoptrue
          unknown
          publicitttyps.shoptrue
            unknown
            bouncedgowp.shoptrue
              unknown
              bargainnykwo.shoptrue
                unknown
                affecthorsedpo.shoptrue
                  unknown
                  radiationnopp.shoptrue
                    unknown
                    answerrsdo.shoptrue
                      unknown
                      bannngwko.shoptrue
                        unknown
                        No contacted IP infos
                        Joe Sandbox version:41.0.0 Charoite
                        Analysis ID:1540046
                        Start date and time:2024-10-23 11:27:19 +02:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 1m 36s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:1
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe
                        Detection:MAL
                        Classification:mal100.troj.evad.winEXE@0/0@0/0
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Unable to launch sample, stop analysis
                        • No process behavior to analyse as no analysis process or sample was found
                        • Corrupt sample or wrongly selected analyzer. Details: %1 is not a valid Win32 application.
                        • Exclude process from analysis (whitelisted): dllhost.exe
                        • Excluded domains from analysis (whitelisted): client.wns.windows.com, azurefd-t-fb-prod.trafficmanager.net, otelrules.azureedge.net, otelrules.afd.azureedge.net, azureedge-t-prod.trafficmanager.net
                        • VT rate limit hit for: 1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe
                        No simulations
                        No context
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        s-part-0017.t-0009.fb-t-msedge.net17296648072623f4a0a7a8993b24c9944db2d8a4b5cb8181b271031f3cc3e1ec5d4594da6f490.dat-decoded.exeGet hashmaliciousLummaCBrowse
                        • 13.107.253.45
                        gBYV3uACcC.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                        • 13.107.253.45
                        file.exeGet hashmaliciousCredential FlusherBrowse
                        • 13.107.253.45
                        https://netorg11230081-my.sharepoint.com/:f:/g/personal/info_onafastpacecontracting_com/Eoa77Lo8BXlOut3qDNQUDAQBBgmgCvIALxhAXrlqjk9Asw?e=2UKAY6Get hashmaliciousUnknownBrowse
                        • 13.107.253.45
                        17296647675a227633e026f1e0b73c1235d63ba2c9f78fec358d3847a30422d034356fce77674.dat-decoded.exeGet hashmaliciousLummaCBrowse
                        • 13.107.253.45
                        https://www.google.com/amp/s/jlxzy.app.link/zJOXskDTTNbGet hashmaliciousUnknownBrowse
                        • 13.107.253.45
                        17296650086d5bc5a71bced605238e8f4e5d5fe29da4cb1d156104fe729d3b01cece68c417301.dat-decoded.exeGet hashmaliciousRemcosBrowse
                        • 13.107.253.45
                        17296647820433a543d4d7bfc485f5c0f1d9cd4af39460f3ad96b5fb6e7336548c30e29566449.dat-decoded.exeGet hashmaliciousUnknownBrowse
                        • 13.107.253.45
                        172966476821ab587c9b4efa390798195c780a8f2dda2b80c8f6c1d32c5ca7f5da55887992606.dat-decoded.exeGet hashmaliciousVidarBrowse
                        • 13.107.253.45
                        1729664769153946c3b2973ce41f32169c95ae8bd62c120bfb49d9dc10da2a504e867713f4855.dat-decoded.exeGet hashmaliciousRedLineBrowse
                        • 13.107.253.45
                        No context
                        No context
                        No context
                        No created / dropped files found
                        File type:PE32 executable Intel 80386, for MS Windows
                        Entropy (8bit):6.793968819342973
                        TrID:
                        • Generic Win/DOS Executable (2004/3) 49.94%
                        • DOS Executable Generic (2002/1) 49.89%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.17%
                        File name:1729664768be9acdf773bae4037b7e64b0990e34fabda84513239bfa0daa8b8ea6e25e16b1342.dat-decoded.exe
                        File size:322'787 bytes
                        MD5:372ee7c999fd8e58d0e26d7955ff8bab
                        SHA1:f0e522b300d680cb6dd1066c20ab11958df6c6e9
                        SHA256:74ad50c2a48ee0dd34271d9ba2fea8a347e90e300dd74bf32a496a880044a6a7
                        SHA512:a1073d9484956ebc0ebdffe38f9aca711015da82d6ece36f23803c8e8697edb3237970997109aba3921c0bd501ff2b7a44428342af66a367b588b7e8f23c9ee8
                        SSDEEP:6144:06Nf4poIkLWHErdbZGGWeTZ8kplKSaTQ4/y1/ZEDx/ZTjFm:06+a7dpuk4KJITjFm
                        TLSH:FB647C07DA3350E1CCCB467675AB733FA93A120653384EC78A6CEED468632E2E475D46
                        File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L....9.f........................z......P.............@..........................p............@.....................................
                        Icon Hash:00928e8e8686b000
                        Entrypoint:0x50000000
                        Entrypoint Section:.relo
                        Digitally signed:false
                        Imagebase:0x0
                        Subsystem:unknown
                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                        DLL Characteristics:NO_ISOLATION
                        Time Stamp:0x668339C7 [Mon Jul 1 23:20:39 2024 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:2
                        OS Version Minor:1536
                        File Version Major:2
                        File Version Minor:1536
                        Subsystem Version Major:2
                        Subsystem Version Minor:1536
                        Import Hash:
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0xbf0000000x780003f6
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00xd0000520
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x4d0x0`.rdat
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0xd40000000x9c0003f7
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        `.rdat0x2a0xa70000610x3d02268a885b89ef225ebe0c1c5f842fd8bunknownunknownunknownunknownIMAGE_SCN_MEM_READ
                        .relo0x4d0xd00000630x52076370b0bdf1c0b612564fea0ca4481f6unknownunknownunknownunknownIMAGE_SCN_MEM_READ
                        @.data0x1120x40000000x40056681329d22070d258c9ae5f88b5f0eaunknownunknownunknownunknownIMAGE_SCN_MEM_READ
                        .text0x3b20x2b0000000x104ae71336e44bf9bf79d2752e234818a5unknownunknownunknownunknownIMAGE_SCN_MEM_EXECUTE
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Oct 23, 2024 11:28:17.373416901 CEST1.1.1.1192.168.2.60x2b10No error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.netazurefd-t-fb-prod.trafficmanager.netCNAME (Canonical name)IN (0x0001)false
                        Oct 23, 2024 11:28:17.373416901 CEST1.1.1.1192.168.2.60x2b10No error (0)dual.s-part-0017.t-0009.fb-t-msedge.nets-part-0017.t-0009.fb-t-msedge.netCNAME (Canonical name)IN (0x0001)false
                        Oct 23, 2024 11:28:17.373416901 CEST1.1.1.1192.168.2.60x2b10No error (0)s-part-0017.t-0009.fb-t-msedge.net13.107.253.45A (IP address)IN (0x0001)false
                        No statistics
                        No system behavior
                        No disassembly