top title background image
flash

z3oPvgjvyN.exe

Status: finished
Submission Time: 2024-12-12 17:17:13 +01:00
Malicious
Trojan
Spyware
Evader
LummaC Stealer

Comments

Tags

  • exe
  • lumma
  • stealer
  • windows

Details

  • Analysis ID:
    1573900
  • API (Web) ID:
    1573900
  • Original Filename:
    5ea43fa41e27d504bb8e50bdac33d13aac3a7e456baf7f6125c9a62cbf6027da.exe
  • Analysis Started:
    2024-12-12 17:37:19 +01:00
  • Analysis Finished:
    2024-12-12 17:44:37 +01:00
  • MD5:
    7baf436e77b6fd6146267d094fed3e3e
  • SHA1:
    2b6f13814da90e3e9be6f6334a059f65f3509394
  • SHA256:
    5ea43fa41e27d504bb8e50bdac33d13aac3a7e456baf7f6125c9a62cbf6027da
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 18/38
malicious

IPs

IP Country Detection
172.67.206.64
United States
190.92.154.206
Argentina

Domains

Name IP Detection
covery-mover.biz
172.67.206.64
regard-survey.cyou
0.0.0.0
zinc-sneark.biz
0.0.0.0
Click to see the 4 hidden entries
dwell-exclaim.biz
0.0.0.0
formy-spill.biz
0.0.0.0
rea.grupolalegion.ec
190.92.154.206
se-blurry.biz
0.0.0.0

URLs

Name Detection
https://covery-mover.biz/apiF9
https://covery-mover.biz/4
https://covery-mover.biz/l
Click to see the 76 hidden entries
https://covery-mover.biz:443/api
https://covery-mover.biz/apibu
https://covery-mover.biz/s
https://covery-mover.biz/apimeQ
https://covery-mover.biz/api
https://covery-mover.biz/apier
regard-survey.cyou
https://covery-mover.biz/E=
https://covery-mover.biz/apis
https://covery-mover.biz:443/apiza
https://covery-mover.biz/
https://covery-mover.biz/OCES
https://covery-mover.biz/eDrivF
https://covery-mover.biz/ath=&F8
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
https://rea.grupolalegion.ec/a
https://rea.grupolalegion.ec/
https://imp.mt48.net/static?id=7RHzfOIX
http://crl.rootca1.amazontrust.com/rootca1.crl0
https://www.ecosia.org/newtab/
https://rea.grupolalegion.ec/h
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
https://ac.ecosia.org/autocomplete?q=
https://rea.grupolalegion.ec/9
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
http://ocsp.rootca1.amazontrust.com0:
https://%s/hooks/%shttps://twitter.comif-unmodified-sinceillegal
https://discord.com/api/webhooksin
http://crl.micro
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
https://docs.ntfy.sh/publish/#scheduled-delivery
http://schema.org/extensionshttps://%s/%s/%s
https://support.microsof
https://rea.grupolalegion.ec/ZohoWriter.exe
http://crt.rootca1.amazontrust.com/rootca1.cer0?
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
https://maker.ifttt.com/trigger/%s/with/key/%sinvalid
https://github.com/Finb/Bark/tree/master/Sounds
print-vexer.biz
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
https://discord.com/if/with
https://discord.com/developers/docs/reference#authentication-example-bot-token-authorization-header
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
http://x1.c.lencr.org/0
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
zinc-sneark.biz
https://api.telegram.org/bot%s/%shttps://hooks.slack.com/services/imaging:
https://cdn.discordapp.com/incomplete
https://rea.grupolalegion.ec:443/ZohoWriter.exe
dwell-exclaim.biz
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
http://x1.i.lencr.org/0
https://status.discord.com/api/v2/illegal
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
https://api.pushover.net/1/messages.jsoninvalid
https://duckduckgo.com/ac/?q=
https://rea.grupolalegion.ec/ZohoWriter.exe&D%#
impend-differ.biz
dare-curbys.biz
covery-mover.biz
https://joinjoaomgcd.appspot.com/_ah/api/messaging/v1/sendPushinvalid
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
formy-spill.biz
https://developers.google.com/protocol-buffers/docs/reference/go/faq#namespace-conflictIl
se-blurry.biz
https://support.mozilla.org/products/firefoxgro.all
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
https://duckduckgo.com/chrome_newtab
https://rea.grupolalegion.ec/ZohoWriter.exe?z
https://containrrr.dev/shoutrrr/%s/%sinternal
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
https://docs.ntfy.sh/publish/#action-buttons
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
https://slack.com/api/chat.postMessageindex

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\KCT5ZDUYENUXRKPIQ5ASQH2C8R3A.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
#