Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
17280510295b445988b983a0ba49d44db487bf2f71dfa528305f86c932b16b62f2d30add9d700.dat-decoded.exe

Overview

General Information

Sample name:17280510295b445988b983a0ba49d44db487bf2f71dfa528305f86c932b16b62f2d30add9d700.dat-decoded.exe
Analysis ID:1525918
MD5:164eb877226ca8048b6174ab1c19411f
SHA1:72246e7ded9eca6a5ae5571f54f73bea754e0915
SHA256:045ebac9be39cdf940790eee8267d9b69710c39808e41368ca42ee4d3c890079
Tags:base64-decodedexeuser-abuse_ch
Infos:
Errors
  • No process behavior to analyse as no analysis process or sample was found
  • Corrupt sample or wrongly selected analyzer. Details: %1 is not a valid Win32 application.

Detection

LummaC
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected LummaC Stealer
C2 URLs / IPs found in malware configuration
LummaC encrypted strings found
Machine Learning detection for sample
PE file contains section with special chars
Sample uses string decryption to hide its real strings
PE file contains sections with non-standard names
PE file does not import any functions
PE file overlay found
Uses 32bit PE files

Classification

NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["tendencctywop.shop", "keennylrwmqlw.shop", "licenseodqwmqn.shop", "tryyudjasudqo.shop", "tesecuuweqo.shop", "eemmbryequo.shop", "relaxatinownio.shop", "reggwardssdqw.shop"], "Build id": "DtiPjR--myfile"}
SourceRuleDescriptionAuthorStrings
decrypted.binstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 17280510295b445988b983a0ba49d44db487bf2f71dfa528305f86c932b16b62f2d30add9d700.dat-decoded.exeMalware Configuration Extractor: LummaC {"C2 url": ["tendencctywop.shop", "keennylrwmqlw.shop", "licenseodqwmqn.shop", "tryyudjasudqo.shop", "tesecuuweqo.shop", "eemmbryequo.shop", "relaxatinownio.shop", "reggwardssdqw.shop"], "Build id": "DtiPjR--myfile"}
    Source: 17280510295b445988b983a0ba49d44db487bf2f71dfa528305f86c932b16b62f2d30add9d700.dat-decoded.exeReversingLabs: Detection: 15%
    Source: 17280510295b445988b983a0ba49d44db487bf2f71dfa528305f86c932b16b62f2d30add9d700.dat-decoded.exeJoe Sandbox ML: detected
    Source: 17280510295b445988b983a0ba49d44db487bf2f71dfa528305f86c932b16b62f2d30add9d700.dat-decoded.exeString decryptor: tryyudjasudqo.shop
    Source: 17280510295b445988b983a0ba49d44db487bf2f71dfa528305f86c932b16b62f2d30add9d700.dat-decoded.exeString decryptor: eemmbryequo.shop
    Source: 17280510295b445988b983a0ba49d44db487bf2f71dfa528305f86c932b16b62f2d30add9d700.dat-decoded.exeString decryptor: reggwardssdqw.shop
    Source: 17280510295b445988b983a0ba49d44db487bf2f71dfa528305f86c932b16b62f2d30add9d700.dat-decoded.exeString decryptor: relaxatinownio.shop
    Source: 17280510295b445988b983a0ba49d44db487bf2f71dfa528305f86c932b16b62f2d30add9d700.dat-decoded.exeString decryptor: tesecuuweqo.shop
    Source: 17280510295b445988b983a0ba49d44db487bf2f71dfa528305f86c932b16b62f2d30add9d700.dat-decoded.exeString decryptor: tendencctywop.shop
    Source: 17280510295b445988b983a0ba49d44db487bf2f71dfa528305f86c932b16b62f2d30add9d700.dat-decoded.exeString decryptor: licenseodqwmqn.shop
    Source: 17280510295b445988b983a0ba49d44db487bf2f71dfa528305f86c932b16b62f2d30add9d700.dat-decoded.exeString decryptor: keennylrwmqlw.shop
    Source: 17280510295b445988b983a0ba49d44db487bf2f71dfa528305f86c932b16b62f2d30add9d700.dat-decoded.exeString decryptor: licenseodqwmqn.shop
    Source: 17280510295b445988b983a0ba49d44db487bf2f71dfa528305f86c932b16b62f2d30add9d700.dat-decoded.exeString decryptor: lid=%s&j=%s&ver=4.0
    Source: 17280510295b445988b983a0ba49d44db487bf2f71dfa528305f86c932b16b62f2d30add9d700.dat-decoded.exeString decryptor: TeslaBrowser/5.5
    Source: 17280510295b445988b983a0ba49d44db487bf2f71dfa528305f86c932b16b62f2d30add9d700.dat-decoded.exeString decryptor: - Screen Resoluton:
    Source: 17280510295b445988b983a0ba49d44db487bf2f71dfa528305f86c932b16b62f2d30add9d700.dat-decoded.exeString decryptor: - Physical Installed Memory:
    Source: 17280510295b445988b983a0ba49d44db487bf2f71dfa528305f86c932b16b62f2d30add9d700.dat-decoded.exeString decryptor: Workgroup: -
    Source: 17280510295b445988b983a0ba49d44db487bf2f71dfa528305f86c932b16b62f2d30add9d700.dat-decoded.exeString decryptor: DtiPjR--myfile
    Source: 17280510295b445988b983a0ba49d44db487bf2f71dfa528305f86c932b16b62f2d30add9d700.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: 17280510295b445988b983a0ba49d44db487bf2f71dfa528305f86c932b16b62f2d30add9d700.dat-decoded.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

    Networking

    barindex
    Source: Malware configuration extractorURLs: tendencctywop.shop
    Source: Malware configuration extractorURLs: keennylrwmqlw.shop
    Source: Malware configuration extractorURLs: licenseodqwmqn.shop
    Source: Malware configuration extractorURLs: tryyudjasudqo.shop
    Source: Malware configuration extractorURLs: tesecuuweqo.shop
    Source: Malware configuration extractorURLs: eemmbryequo.shop
    Source: Malware configuration extractorURLs: relaxatinownio.shop
    Source: Malware configuration extractorURLs: reggwardssdqw.shop

    System Summary

    barindex
    Source: 17280510295b445988b983a0ba49d44db487bf2f71dfa528305f86c932b16b62f2d30add9d700.dat-decoded.exeStatic PE information: section name: @.data
    Source: 17280510295b445988b983a0ba49d44db487bf2f71dfa528305f86c932b16b62f2d30add9d700.dat-decoded.exeStatic PE information: No import functions for PE file found
    Source: 17280510295b445988b983a0ba49d44db487bf2f71dfa528305f86c932b16b62f2d30add9d700.dat-decoded.exeStatic PE information: Data appended to the last section found
    Source: 17280510295b445988b983a0ba49d44db487bf2f71dfa528305f86c932b16b62f2d30add9d700.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: classification engineClassification label: mal84.troj.evad.winEXE@0/0@0/0
    Source: 17280510295b445988b983a0ba49d44db487bf2f71dfa528305f86c932b16b62f2d30add9d700.dat-decoded.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: 17280510295b445988b983a0ba49d44db487bf2f71dfa528305f86c932b16b62f2d30add9d700.dat-decoded.exeReversingLabs: Detection: 15%
    Source: 17280510295b445988b983a0ba49d44db487bf2f71dfa528305f86c932b16b62f2d30add9d700.dat-decoded.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: 17280510295b445988b983a0ba49d44db487bf2f71dfa528305f86c932b16b62f2d30add9d700.dat-decoded.exeStatic PE information: section name: .relo
    Source: 17280510295b445988b983a0ba49d44db487bf2f71dfa528305f86c932b16b62f2d30add9d700.dat-decoded.exeStatic PE information: section name: @.data

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: 17280510295b445988b983a0ba49d44db487bf2f71dfa528305f86c932b16b62f2d30add9d700.dat-decoded.exeString found in binary or memory: tryyudjasudqo.shop
    Source: 17280510295b445988b983a0ba49d44db487bf2f71dfa528305f86c932b16b62f2d30add9d700.dat-decoded.exeString found in binary or memory: eemmbryequo.shop
    Source: 17280510295b445988b983a0ba49d44db487bf2f71dfa528305f86c932b16b62f2d30add9d700.dat-decoded.exeString found in binary or memory: reggwardssdqw.shop
    Source: 17280510295b445988b983a0ba49d44db487bf2f71dfa528305f86c932b16b62f2d30add9d700.dat-decoded.exeString found in binary or memory: relaxatinownio.shop
    Source: 17280510295b445988b983a0ba49d44db487bf2f71dfa528305f86c932b16b62f2d30add9d700.dat-decoded.exeString found in binary or memory: tesecuuweqo.shop
    Source: 17280510295b445988b983a0ba49d44db487bf2f71dfa528305f86c932b16b62f2d30add9d700.dat-decoded.exeString found in binary or memory: tendencctywop.shop
    Source: 17280510295b445988b983a0ba49d44db487bf2f71dfa528305f86c932b16b62f2d30add9d700.dat-decoded.exeString found in binary or memory: licenseodqwmqn.shop
    Source: 17280510295b445988b983a0ba49d44db487bf2f71dfa528305f86c932b16b62f2d30add9d700.dat-decoded.exeString found in binary or memory: keennylrwmqlw.shop

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: decrypted.binstr, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: decrypted.binstr, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    PowerShell
    Path InterceptionPath Interception1
    Deobfuscate/Decode Files or Information
    OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
    Application Layer Protocol
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    17280510295b445988b983a0ba49d44db487bf2f71dfa528305f86c932b16b62f2d30add9d700.dat-decoded.exe16%ReversingLabs
    17280510295b445988b983a0ba49d44db487bf2f71dfa528305f86c932b16b62f2d30add9d700.dat-decoded.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No contacted domains info
    NameMaliciousAntivirus DetectionReputation
    tryyudjasudqo.shoptrue
      unknown
      keennylrwmqlw.shoptrue
        unknown
        reggwardssdqw.shoptrue
          unknown
          tesecuuweqo.shoptrue
            unknown
            tendencctywop.shoptrue
              unknown
              eemmbryequo.shoptrue
                unknown
                licenseodqwmqn.shoptrue
                  unknown
                  relaxatinownio.shoptrue
                    unknown
                    No contacted IP infos
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1525918
                    Start date and time:2024-10-04 16:18:25 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 2m 5s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:1
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:17280510295b445988b983a0ba49d44db487bf2f71dfa528305f86c932b16b62f2d30add9d700.dat-decoded.exe
                    Detection:MAL
                    Classification:mal84.troj.evad.winEXE@0/0@0/0
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Unable to launch sample, stop analysis
                    • No process behavior to analyse as no analysis process or sample was found
                    • Corrupt sample or wrongly selected analyzer. Details: %1 is not a valid Win32 application.
                    • Exclude process from analysis (whitelisted): dllhost.exe
                    • VT rate limit hit for: 17280510295b445988b983a0ba49d44db487bf2f71dfa528305f86c932b16b62f2d30add9d700.dat-decoded.exe
                    No simulations
                    No context
                    No context
                    No context
                    No context
                    No context
                    No created / dropped files found
                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Entropy (8bit):6.68270228829449
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 99.96%
                    • Generic Win/DOS Executable (2004/3) 0.02%
                    • DOS Executable Generic (2002/1) 0.02%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:17280510295b445988b983a0ba49d44db487bf2f71dfa528305f86c932b16b62f2d30add9d700.dat-decoded.exe
                    File size:328'218 bytes
                    MD5:164eb877226ca8048b6174ab1c19411f
                    SHA1:72246e7ded9eca6a5ae5571f54f73bea754e0915
                    SHA256:045ebac9be39cdf940790eee8267d9b69710c39808e41368ca42ee4d3c890079
                    SHA512:23ce65993050e324703771f7c4f29786927399e43adc3af0fcbf2450403aac8d8659c77f7d5518a5d6172458b1eb0dba61571cb0a8e198813e926055daa52a2d
                    SSDEEP:6144:pKPcsqgA+gTaOVk//BIYXxPzgUkVP4c4ljt2xVUVXDIJXEr4HbgXA1dgvgwu5dG8:FsFC1mksfPFifF+
                    TLSH:BF645D09DF23C099EC9B44B151F9E73FDA7923158B324C8B9A9CD6A07C636DF2031986
                    File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L....".f..........................................@.......................................@.................................q4..x..
                    Icon Hash:00928e8e8686b000
                    Entrypoint:0x40a1a0
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Time Stamp:0x66DB2289 [Fri Sep 6 15:40:57 2024 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:6
                    OS Version Minor:0
                    File Version Major:6
                    File Version Minor:0
                    Subsystem Version Major:6
                    Subsystem Version Minor:0
                    Import Hash:
                    Instruction
                    pop eax
                    mov edi, edx
                    cmp dword ptr [esp+18h], 00000000h
                    je 00007F43D48DFC23h
                    cmp ebx, 01h
                    adc ebx, 00000000h
                    cmp ebx, eax
                    jnc 00007F43D48DFC1Bh
                    nop
                    nop
                    nop
                    nop
                    nop
                    nop
                    nop
                    nop
                    nop
                    mov edx, ebx
                    and edx, FFFFFFFDh
                    mov ebp, ebx
                    cmp byte ptr [eax], 00000013h
                    lodsd
                    in eax, 02h
                    or ebx, 02h
                    imul ebx, ebp
                    xor ebp, 02h
                    imul ebp, edx
                    add ebx, ebp
                    cmp ebx, eax
                    jc 00007F43D48DFBD6h
                    jmp 00007F43D48DFBF4h
                    mov ebx, eax
                    push ebx
                    push dword ptr [edi+0Ch]
                    push dword ptr [edi]
                    push dword ptr [ecx+34h]
                    call dword ptr [ecx+30h]
                    add esp, 10h
                    test eax, eax
                    je 00007F43D48DFBF9h
                    mov dword ptr [edi], eax
                    mov dword ptr [edi+08h], ebx
                    jmp 00007F43D48DFBF4h
                    xor esi, esi
                    mov eax, esi
                    pop esi
                    pop edi
                    pop ebx
                    pop ebp
                    ret
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    push ecx
                    lea ecx, dword ptr [esp+04h]
                    sub ecx, eax
                    sbb eax, eax
                    not eax
                    and ecx, eax
                    mov eax, esp
                    and eax, FFFFF000h
                    cmp ecx, eax
                    jc 00007F43D48DFBFCh
                    mov eax, ecx
                    pop ecx
                    xchg eax, esp
                    mov eax, dword ptr [eax]
                    mov dword ptr [esp], eax
                    ret
                    sub eax, 00001000h
                    test dword ptr [eax], eax
                    call 00007F43BE3B0F2Dh
                    int3
                    int3
                    int3
                    int3
                    int3
                    jmp 00007F43D4910F50h
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    jmp 00007F43D4910FE0h
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    jmp 00007F43D4912D30h
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x434710x78.relo
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x530000x41d8.relo
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x435940xa8.relo
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .relo0x410xd80000630x530af2c93099a96bfc5f4f89ab51bf279acunknownunknownunknownunknownIMAGE_SCN_MEM_READ
                    @.data0xeb0xb80000000x440ed0eee0036818305899fc2001fc717aaunknownunknownunknownunknownIMAGE_SCN_MEM_READ
                    .text0x10000x3f3410x3f400822d1255fbcac66f0fea4582875b2284False0.4742851408102767data6.516375664844288IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rdata0x410000x289d0x2a00d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ
                    No network behavior found
                    No statistics
                    No system behavior
                    No disassembly