Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1728051009ddd37f05bf17e06320c562854414579dfbd5afdf77d133a3e128c4a10feb2469902.dat-decoded.exe

Overview

General Information

Sample name:1728051009ddd37f05bf17e06320c562854414579dfbd5afdf77d133a3e128c4a10feb2469902.dat-decoded.exe
Analysis ID:1525932
MD5:75096fa0c5fa1c62bde8b7f63ac05b98
SHA1:115bf0792da65bfa2ab0097b626881eed5f83be7
SHA256:6ab1a71c0b1bc3fe63c680d5d75703b05ccba656dc22b491dac2f13832b7e21d
Tags:base64-decodedexeuser-abuse_ch
Infos:
Errors
  • No process behavior to analyse as no analysis process or sample was found
  • Corrupt sample or wrongly selected analyzer. Details: %1 is not a valid Win32 application.

Detection

LummaC
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected LummaC Stealer
C2 URLs / IPs found in malware configuration
LummaC encrypted strings found
Machine Learning detection for sample
PE file contains section with special chars
Sample uses string decryption to hide its real strings
PE file contains sections with non-standard names
PE file does not import any functions
PE file overlay found
Uses 32bit PE files

Classification

NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["stitchmiscpaew.shop", "grassemenwji.shop", "exmptiondixv.shop", "ignoracndwko.shop", "preachstrwnwjw.shop", "complainnykso.shop", "basedsymsotp.shop", "charistmatwio.shop", "commisionipwn.shop"], "Build id": "eFtdO8--"}
SourceRuleDescriptionAuthorStrings
decrypted.binstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 1728051009ddd37f05bf17e06320c562854414579dfbd5afdf77d133a3e128c4a10feb2469902.dat-decoded.exeMalware Configuration Extractor: LummaC {"C2 url": ["stitchmiscpaew.shop", "grassemenwji.shop", "exmptiondixv.shop", "ignoracndwko.shop", "preachstrwnwjw.shop", "complainnykso.shop", "basedsymsotp.shop", "charistmatwio.shop", "commisionipwn.shop"], "Build id": "eFtdO8--"}
    Source: 1728051009ddd37f05bf17e06320c562854414579dfbd5afdf77d133a3e128c4a10feb2469902.dat-decoded.exeReversingLabs: Detection: 15%
    Source: 1728051009ddd37f05bf17e06320c562854414579dfbd5afdf77d133a3e128c4a10feb2469902.dat-decoded.exeJoe Sandbox ML: detected
    Source: 1728051009ddd37f05bf17e06320c562854414579dfbd5afdf77d133a3e128c4a10feb2469902.dat-decoded.exeString decryptor: commisionipwn.shop
    Source: 1728051009ddd37f05bf17e06320c562854414579dfbd5afdf77d133a3e128c4a10feb2469902.dat-decoded.exeString decryptor: stitchmiscpaew.shop
    Source: 1728051009ddd37f05bf17e06320c562854414579dfbd5afdf77d133a3e128c4a10feb2469902.dat-decoded.exeString decryptor: ignoracndwko.shop
    Source: 1728051009ddd37f05bf17e06320c562854414579dfbd5afdf77d133a3e128c4a10feb2469902.dat-decoded.exeString decryptor: grassemenwji.shop
    Source: 1728051009ddd37f05bf17e06320c562854414579dfbd5afdf77d133a3e128c4a10feb2469902.dat-decoded.exeString decryptor: charistmatwio.shop
    Source: 1728051009ddd37f05bf17e06320c562854414579dfbd5afdf77d133a3e128c4a10feb2469902.dat-decoded.exeString decryptor: basedsymsotp.shop
    Source: 1728051009ddd37f05bf17e06320c562854414579dfbd5afdf77d133a3e128c4a10feb2469902.dat-decoded.exeString decryptor: complainnykso.shop
    Source: 1728051009ddd37f05bf17e06320c562854414579dfbd5afdf77d133a3e128c4a10feb2469902.dat-decoded.exeString decryptor: preachstrwnwjw.shop
    Source: 1728051009ddd37f05bf17e06320c562854414579dfbd5afdf77d133a3e128c4a10feb2469902.dat-decoded.exeString decryptor: exmptiondixv.shop
    Source: 1728051009ddd37f05bf17e06320c562854414579dfbd5afdf77d133a3e128c4a10feb2469902.dat-decoded.exeString decryptor: lid=%s&j=%s&ver=4.0
    Source: 1728051009ddd37f05bf17e06320c562854414579dfbd5afdf77d133a3e128c4a10feb2469902.dat-decoded.exeString decryptor: TeslaBrowser/5.5
    Source: 1728051009ddd37f05bf17e06320c562854414579dfbd5afdf77d133a3e128c4a10feb2469902.dat-decoded.exeString decryptor: - Screen Resoluton:
    Source: 1728051009ddd37f05bf17e06320c562854414579dfbd5afdf77d133a3e128c4a10feb2469902.dat-decoded.exeString decryptor: - Physical Installed Memory:
    Source: 1728051009ddd37f05bf17e06320c562854414579dfbd5afdf77d133a3e128c4a10feb2469902.dat-decoded.exeString decryptor: Workgroup: -
    Source: 1728051009ddd37f05bf17e06320c562854414579dfbd5afdf77d133a3e128c4a10feb2469902.dat-decoded.exeString decryptor: eFtdO8--
    Source: 1728051009ddd37f05bf17e06320c562854414579dfbd5afdf77d133a3e128c4a10feb2469902.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: 1728051009ddd37f05bf17e06320c562854414579dfbd5afdf77d133a3e128c4a10feb2469902.dat-decoded.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

    Networking

    barindex
    Source: Malware configuration extractorURLs: stitchmiscpaew.shop
    Source: Malware configuration extractorURLs: grassemenwji.shop
    Source: Malware configuration extractorURLs: exmptiondixv.shop
    Source: Malware configuration extractorURLs: ignoracndwko.shop
    Source: Malware configuration extractorURLs: preachstrwnwjw.shop
    Source: Malware configuration extractorURLs: complainnykso.shop
    Source: Malware configuration extractorURLs: basedsymsotp.shop
    Source: Malware configuration extractorURLs: charistmatwio.shop
    Source: Malware configuration extractorURLs: commisionipwn.shop

    System Summary

    barindex
    Source: 1728051009ddd37f05bf17e06320c562854414579dfbd5afdf77d133a3e128c4a10feb2469902.dat-decoded.exeStatic PE information: section name: @.data
    Source: 1728051009ddd37f05bf17e06320c562854414579dfbd5afdf77d133a3e128c4a10feb2469902.dat-decoded.exeStatic PE information: No import functions for PE file found
    Source: 1728051009ddd37f05bf17e06320c562854414579dfbd5afdf77d133a3e128c4a10feb2469902.dat-decoded.exeStatic PE information: Data appended to the last section found
    Source: 1728051009ddd37f05bf17e06320c562854414579dfbd5afdf77d133a3e128c4a10feb2469902.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: classification engineClassification label: mal84.troj.evad.winEXE@0/0@0/0
    Source: 1728051009ddd37f05bf17e06320c562854414579dfbd5afdf77d133a3e128c4a10feb2469902.dat-decoded.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: 1728051009ddd37f05bf17e06320c562854414579dfbd5afdf77d133a3e128c4a10feb2469902.dat-decoded.exeReversingLabs: Detection: 15%
    Source: 1728051009ddd37f05bf17e06320c562854414579dfbd5afdf77d133a3e128c4a10feb2469902.dat-decoded.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: 1728051009ddd37f05bf17e06320c562854414579dfbd5afdf77d133a3e128c4a10feb2469902.dat-decoded.exeStatic PE information: section name: .relo
    Source: 1728051009ddd37f05bf17e06320c562854414579dfbd5afdf77d133a3e128c4a10feb2469902.dat-decoded.exeStatic PE information: section name: @.data

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: 1728051009ddd37f05bf17e06320c562854414579dfbd5afdf77d133a3e128c4a10feb2469902.dat-decoded.exeString found in binary or memory: commisionipwn.shop
    Source: 1728051009ddd37f05bf17e06320c562854414579dfbd5afdf77d133a3e128c4a10feb2469902.dat-decoded.exeString found in binary or memory: stitchmiscpaew.shop
    Source: 1728051009ddd37f05bf17e06320c562854414579dfbd5afdf77d133a3e128c4a10feb2469902.dat-decoded.exeString found in binary or memory: ignoracndwko.shop
    Source: 1728051009ddd37f05bf17e06320c562854414579dfbd5afdf77d133a3e128c4a10feb2469902.dat-decoded.exeString found in binary or memory: grassemenwji.shop
    Source: 1728051009ddd37f05bf17e06320c562854414579dfbd5afdf77d133a3e128c4a10feb2469902.dat-decoded.exeString found in binary or memory: charistmatwio.shop
    Source: 1728051009ddd37f05bf17e06320c562854414579dfbd5afdf77d133a3e128c4a10feb2469902.dat-decoded.exeString found in binary or memory: basedsymsotp.shop
    Source: 1728051009ddd37f05bf17e06320c562854414579dfbd5afdf77d133a3e128c4a10feb2469902.dat-decoded.exeString found in binary or memory: complainnykso.shop
    Source: 1728051009ddd37f05bf17e06320c562854414579dfbd5afdf77d133a3e128c4a10feb2469902.dat-decoded.exeString found in binary or memory: preachstrwnwjw.shop
    Source: 1728051009ddd37f05bf17e06320c562854414579dfbd5afdf77d133a3e128c4a10feb2469902.dat-decoded.exeString found in binary or memory: exmptiondixv.shop

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: decrypted.binstr, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: decrypted.binstr, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    PowerShell
    Path InterceptionPath Interception1
    Deobfuscate/Decode Files or Information
    OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
    Application Layer Protocol
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    1728051009ddd37f05bf17e06320c562854414579dfbd5afdf77d133a3e128c4a10feb2469902.dat-decoded.exe16%ReversingLabs
    1728051009ddd37f05bf17e06320c562854414579dfbd5afdf77d133a3e128c4a10feb2469902.dat-decoded.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No contacted domains info
    NameMaliciousAntivirus DetectionReputation
    charistmatwio.shoptrue
      unknown
      ignoracndwko.shoptrue
        unknown
        grassemenwji.shoptrue
          unknown
          stitchmiscpaew.shoptrue
            unknown
            preachstrwnwjw.shoptrue
              unknown
              commisionipwn.shoptrue
                unknown
                complainnykso.shoptrue
                  unknown
                  exmptiondixv.shoptrue
                    unknown
                    basedsymsotp.shoptrue
                      unknown
                      No contacted IP infos
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1525932
                      Start date and time:2024-10-04 16:42:08 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 2m 28s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:1
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:1728051009ddd37f05bf17e06320c562854414579dfbd5afdf77d133a3e128c4a10feb2469902.dat-decoded.exe
                      Detection:MAL
                      Classification:mal84.troj.evad.winEXE@0/0@0/0
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Unable to launch sample, stop analysis
                      • No process behavior to analyse as no analysis process or sample was found
                      • Corrupt sample or wrongly selected analyzer. Details: %1 is not a valid Win32 application.
                      • Exclude process from analysis (whitelisted): dllhost.exe
                      • VT rate limit hit for: 1728051009ddd37f05bf17e06320c562854414579dfbd5afdf77d133a3e128c4a10feb2469902.dat-decoded.exe
                      No simulations
                      No context
                      No context
                      No context
                      No context
                      No context
                      No created / dropped files found
                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):6.68293358885377
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 99.96%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:1728051009ddd37f05bf17e06320c562854414579dfbd5afdf77d133a3e128c4a10feb2469902.dat-decoded.exe
                      File size:328'221 bytes
                      MD5:75096fa0c5fa1c62bde8b7f63ac05b98
                      SHA1:115bf0792da65bfa2ab0097b626881eed5f83be7
                      SHA256:6ab1a71c0b1bc3fe63c680d5d75703b05ccba656dc22b491dac2f13832b7e21d
                      SHA512:745d98dd7dc0137721537a3ba21526a852d48d8df03913756f32582bf8bbf77e479599e92ae9ba9caa1674801a1a6cada7ce7cde4774bae4811a01e28cfd65c8
                      SSDEEP:6144:pKPcsqgA+gTaOVk//BIYXxPzgUkVP4c4ljt2xVUVXDIJXEr4HbgXA1dgvgwu5dGF:FsFC1mksfPFifFx
                      TLSH:3A645D09DF23C099EC9B44B151FAD73FDA7923158B364C8B9A9CD6A07C636DF2031986
                      File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L....".f..........................................@.......................................@.................................q4..x..
                      Icon Hash:90cececece8e8eb0
                      Entrypoint:0x40a1a0
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Time Stamp:0x66DB2289 [Fri Sep 6 15:40:57 2024 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:6
                      OS Version Minor:0
                      File Version Major:6
                      File Version Minor:0
                      Subsystem Version Major:6
                      Subsystem Version Minor:0
                      Import Hash:
                      Instruction
                      pop eax
                      mov edi, edx
                      cmp dword ptr [esp+18h], 00000000h
                      je 00007F2A34AD7843h
                      cmp ebx, 01h
                      adc ebx, 00000000h
                      cmp ebx, eax
                      jnc 00007F2A34AD783Bh
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      mov edx, ebx
                      and edx, FFFFFFFDh
                      mov ebp, ebx
                      cmp byte ptr [eax], 00000013h
                      lodsd
                      in eax, 02h
                      or ebx, 02h
                      imul ebx, ebp
                      xor ebp, 02h
                      imul ebp, edx
                      add ebx, ebp
                      cmp ebx, eax
                      jc 00007F2A34AD77F6h
                      jmp 00007F2A34AD7814h
                      mov ebx, eax
                      push ebx
                      push dword ptr [edi+0Ch]
                      push dword ptr [edi]
                      push dword ptr [ecx+34h]
                      call dword ptr [ecx+30h]
                      add esp, 10h
                      test eax, eax
                      je 00007F2A34AD7819h
                      mov dword ptr [edi], eax
                      mov dword ptr [edi+08h], ebx
                      jmp 00007F2A34AD7814h
                      xor esi, esi
                      mov eax, esi
                      pop esi
                      pop edi
                      pop ebx
                      pop ebp
                      ret
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      push ecx
                      lea ecx, dword ptr [esp+04h]
                      sub ecx, eax
                      sbb eax, eax
                      not eax
                      and ecx, eax
                      mov eax, esp
                      and eax, FFFFF000h
                      cmp ecx, eax
                      jc 00007F2A34AD781Ch
                      mov eax, ecx
                      pop ecx
                      xchg eax, esp
                      mov eax, dword ptr [eax]
                      mov dword ptr [esp], eax
                      ret
                      sub eax, 00001000h
                      test dword ptr [eax], eax
                      call 00007F2A1E5A8B4Dh
                      int3
                      int3
                      int3
                      int3
                      int3
                      jmp 00007F2A34B08B70h
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      jmp 00007F2A34B08C00h
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      jmp 00007F2A34B0A950h
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x434710x78.relo
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x530000x41d8.relo
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x435940xa8.relo
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .relo0x410xd80000630x530af2c93099a96bfc5f4f89ab51bf279acunknownunknownunknownunknownIMAGE_SCN_MEM_READ
                      @.data0xeb0xb80000000x440ed0eee0036818305899fc2001fc717aaunknownunknownunknownunknownIMAGE_SCN_MEM_READ
                      .text0x10000x3f3410x3f400822d1255fbcac66f0fea4582875b2284False0.4742851408102767data6.516375664844288IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rdata0x410000x289d0x2a00d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ
                      No network behavior found
                      No statistics
                      No system behavior
                      No disassembly