Size | 1.2MB |
---|---|
Type | PE32+ executable (console) x86-64, for MS Windows |
MD5 | 9a0f4d0454564e92c202fc8721b13adb |
SHA1 | f63fd6ecf5f0cee99ac9c63d44ef053f0878e7be |
SHA256 | 32a2c5f1dc3f9f06ad456ff2c95dd32bacfac2b71ea88a04a4feba203f1cc77a |
SHA512 |
b0991f942eb53b1afde193174cbae11e37d9c9899b628d7c734a25de39ca469d2d1ddf9594b0b4ca70af84ab94e59eb9f5627abbc319fdad0131db4488926280
|
CRC32 | D22EBDAA |
ssdeep | None |
Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | May 24, 2025, 8:04 p.m. | May 24, 2025, 8:04 p.m. | 33 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-05-24 20:04:04,015 [analyzer] DEBUG: Starting analyzer from: C:\tmpdyrg_l 2025-05-24 20:04:04,015 [analyzer] DEBUG: Pipe server name: \??\PIPE\DdxKuLUAItfduHlNHjzihtjXdJwCjg 2025-05-24 20:04:04,015 [analyzer] DEBUG: Log pipe server name: \??\PIPE\iZZSPNFKUwejttXDyQIGmuaQd 2025-05-24 20:04:04,265 [analyzer] DEBUG: Started auxiliary module Curtain 2025-05-24 20:04:04,265 [analyzer] DEBUG: Started auxiliary module DbgView 2025-05-24 20:04:04,717 [analyzer] DEBUG: Started auxiliary module Disguise 2025-05-24 20:04:04,905 [analyzer] DEBUG: Loaded monitor into process with pid 500 2025-05-24 20:04:04,905 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-05-24 20:04:04,905 [analyzer] DEBUG: Started auxiliary module Human 2025-05-24 20:04:04,905 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-05-24 20:04:04,905 [analyzer] DEBUG: Started auxiliary module Reboot 2025-05-24 20:04:04,983 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-05-24 20:04:04,983 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-05-24 20:04:04,983 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-05-24 20:04:04,983 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-05-24 20:04:05,125 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\LummaStealer.exe' with arguments '' and pid 328 2025-05-24 20:04:05,375 [analyzer] DEBUG: Loaded monitor into process with pid 328 2025-05-24 20:04:08,140 [analyzer] INFO: Process with pid 328 has terminated 2025-05-24 20:04:08,140 [analyzer] INFO: Process list is empty, terminating analysis. 2025-05-24 20:04:09,342 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-05-24 20:04:09,342 [analyzer] INFO: Analysis completed.
2025-05-24 20:04:07,108 [cuckoo.core.scheduler] INFO: Task #6512585: acquired machine win7x6430 (label=win7x6430) 2025-05-24 20:04:07,112 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.230 for task #6512585 2025-05-24 20:04:07,494 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 3170781 (interface=vboxnet0, host=192.168.168.230) 2025-05-24 20:04:09,112 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6430 2025-05-24 20:04:09,797 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6430 to vmcloak 2025-05-24 20:04:17,882 [cuckoo.core.guest] INFO: Starting analysis #6512585 on guest (id=win7x6430, ip=192.168.168.230) 2025-05-24 20:04:18,888 [cuckoo.core.guest] DEBUG: win7x6430: not ready yet 2025-05-24 20:04:23,921 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6430, ip=192.168.168.230) 2025-05-24 20:04:24,425 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6430, ip=192.168.168.230, monitor=latest, size=6660546) 2025-05-24 20:04:25,709 [cuckoo.core.resultserver] DEBUG: Task #6512585: live log analysis.log initialized. 2025-05-24 20:04:26,560 [cuckoo.core.resultserver] DEBUG: Task #6512585 is sending a BSON stream 2025-05-24 20:04:26,950 [cuckoo.core.resultserver] DEBUG: Task #6512585 is sending a BSON stream 2025-05-24 20:04:27,813 [cuckoo.core.resultserver] DEBUG: Task #6512585: File upload for 'shots/0001.jpg' 2025-05-24 20:04:27,825 [cuckoo.core.resultserver] DEBUG: Task #6512585 uploaded file length: 115726 2025-05-24 20:04:29,977 [cuckoo.core.resultserver] DEBUG: Task #6512585: File upload for 'shots/0002.jpg' 2025-05-24 20:04:30,001 [cuckoo.core.resultserver] DEBUG: Task #6512585 uploaded file length: 133466 2025-05-24 20:04:30,953 [cuckoo.core.resultserver] DEBUG: Task #6512585: File upload for 'curtain/1748109849.23.curtain.log' 2025-05-24 20:04:30,956 [cuckoo.core.resultserver] DEBUG: Task #6512585 uploaded file length: 36 2025-05-24 20:04:31,058 [cuckoo.core.resultserver] DEBUG: Task #6512585: File upload for 'sysmon/1748109849.33.sysmon.xml' 2025-05-24 20:04:31,074 [cuckoo.core.resultserver] DEBUG: Task #6512585 uploaded file length: 76394 2025-05-24 20:04:31,090 [cuckoo.core.resultserver] DEBUG: Task #6512585 had connection reset for <Context for LOG> 2025-05-24 20:04:31,390 [cuckoo.core.guest] INFO: win7x6430: analysis completed successfully 2025-05-24 20:04:31,404 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-05-24 20:04:31,442 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-05-24 20:04:32,386 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6430 to path /srv/cuckoo/cwd/storage/analyses/6512585/memory.dmp 2025-05-24 20:04:32,388 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6430 2025-05-24 20:04:40,159 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.230 for task #6512585 2025-05-24 20:04:40,431 [cuckoo.core.scheduler] DEBUG: Released database task #6512585 2025-05-24 20:04:40,455 [cuckoo.core.scheduler] INFO: Task #6512585: analysis procedure completed
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Affect private profile | rule | win_files_operation |
section | .gxfg |
section | .retplne |
section | _RDATA |
section | {u'size_of_data': u'0x00072e00', u'virtual_address': u'0x00001000', u'entropy': 6.955536326709595, u'name': u'.text', u'virtual_size': u'0x00072d50'} | entropy | 6.95553632671 | description | A section with a high entropy has been found | |||||||||
section | {u'size_of_data': u'0x00058c00', u'virtual_address': u'0x00090000', u'entropy': 7.999419372498514, u'name': u'.bss', u'virtual_size': u'0x00058c00'} | entropy | 7.9994193725 | description | A section with a high entropy has been found | |||||||||
section | {u'size_of_data': u'0x00058c00', u'virtual_address': u'0x000e9000', u'entropy': 7.999419372498514, u'name': u'.bss', u'virtual_size': u'0x00058c00'} | entropy | 7.9994193725 | description | A section with a high entropy has been found | |||||||||
entropy | 0.935225909636 | description | Overall entropy of this PE file is high |
Avast Core Security (Linux) | Win64:Evo-gen [Trj] |
WithSecure (Linux) | Trojan:W32/Generic.abch!mind |
ESET Security (Windows) | a variant of Win64/GenKryptik.HIDQ trojan |
Sophos Anti-Virus (Linux) | Troj/Krypt-AQA |
Kaspersky Standard (Windows) | Trojan-PSW.Win32.Lumma.oxf |
Bkav | W64.AIDetectMalware |
Lionic | Trojan.Win32.Generic.4!c |
Cynet | Malicious (score: 100) |
CAT-QuickHeal | cld.trojan.lummastealer |
Skyhigh | BehavesLike.Win64.Trojan.tc |
Cylance | Unsafe |
Sangfor | Trojan.Win64.Agent.Vinx |
CrowdStrike | win/malicious_confidence_100% (W) |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Win64/GenKryptik.HIDQ |
APEX | Malicious |
Avast | Win64:Evo-gen [Trj] |
Kaspersky | Trojan-PSW.Win32.Lumma.oxf |
Alibaba | Trojan:Win32/LummaStealer.927bdd59 |
Rising | Stealer.Lumma!8.177F6 (TFE:1:7Hm5zEjCX2F) |
F-Secure | Trojan.TR/Crypt.Agent.zmgde |
TrendMicro | Trojan.Win64.AMADEY.YXFEXZ |
McAfeeD | ti!32A2C5F1DC3F |
CTX | exe.trojan.lummastealer |
Sophos | Troj/Krypt-AQA |
SentinelOne | Static AI - Suspicious PE |
Detected | |
Avira | TR/Crypt.Agent.zmgde |
Antiy-AVL | Trojan/Win32.LummaStealer |
Gridinsoft | Trojan.Win64.Kryptik.sa |
Microsoft | Trojan:Win32/LummaStealer.ZWK!MTB |
ZoneAlarm | Troj/Krypt-AQA |
GData | Win64.Trojan.Agent.0OMXR0 |
Varist | W64/ABTrojan.MPIC-6999 |
AhnLab-V3 | Trojan/Win.StrelaStealer.C5764351 |
DeepInstinct | MALICIOUS |
Malwarebytes | Crypt.Trojan.MSIL.DDS |
Ikarus | Trojan.Win64.StrelaStealer |
TrendMicro-HouseCall | Trojan.Win32.VSX.PE04C9Z |
TrellixENS | Artemis!9A0F4D045456 |
huorong | HEUR:Trojan/Agent.dc |
Fortinet | W64/GenKryptik.HIDQ!tr |
AVG | Win64:Evo-gen [Trj] |
Paloalto | generic.ml |
alibabacloud | Trojan:Win/LummaStealer.ZIJ2XJC |