Click to jump to signature section
Source: bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe | ReversingLabs: Detection: 76% |
Source: bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe | Metadefender: Detection: 33% | Perma Link |
Source: bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe | Virustotal: Detection: 65% | Perma Link |
Source: http://evetesttech.net | Avira URL Cloud: Label: malware |
Source: http://evetesttech.net/lib/sqlite3.dllMetaMasknkbihfbeogaeaoehlefnkodbefgpgknnTronLinkibnejdfjmmkpcn | Avira URL Cloud: Label: malware |
Source: evetesttech.net | Virustotal: Detection: 15% | Perma Link |
Source: bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe | Malware Configuration Extractor: LummaC {"C2 url": "http://evetesttech.net"} |
Source: C:\Users\user\Desktop\bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe | Code function: 0_2_013C3BCB CryptStringToBinaryA,CryptUnprotectData, | 0_2_013C3BCB |
Source: C:\Users\user\Desktop\bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe | Code function: 0_2_013C98BE CryptStringToBinaryA, | 0_2_013C98BE |
Source: C:\Users\user\Desktop\bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe | Code function: 0_2_013C3C6D CryptUnprotectData, | 0_2_013C3C6D |
Source: bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe | Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe | Static PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: | Binary string: C:\Users\User\source\repos\LummaC\Release\LummaC.pdb source: bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe |
Source: C:\Users\user\Desktop\bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe | Code function: 0_2_013C4303 FindFirstFileA,__fread_nolock,FindNextFileA, | 0_2_013C4303 |
Source: C:\Users\user\Desktop\bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe | Code function: 0_2_013C9D14 ExpandEnvironmentStringsA,FindFirstFileA,FindNextFileA, | 0_2_013C9D14 |
Source: C:\Users\user\Desktop\bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe | Code function: 0_2_013D9C1B FindFirstFileExW, | 0_2_013D9C1B |
Source: C:\Users\user\Desktop\bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe | Code function: 0_2_013C4E17 ExpandEnvironmentStringsW,lstrcatW,lstrcatW,lstrcatW,FindFirstFileW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,__fread_nolock,WideCharToMultiByte,WideCharToMultiByte,FindNextFileW, | 0_2_013C4E17 |
Source: Malware configuration extractor | URLs: http://evetesttech.net |
Source: Joe Sandbox View | ASN Name: HETZNER-ASDE HETZNER-ASDE |
Source: bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe | String found in binary or memory: http://evetesttech.net |
Source: bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe | String found in binary or memory: http://evetesttech.net/lib/sqlite3.dllMetaMasknkbihfbeogaeaoehlefnkodbefgpgknnTronLinkibnejdfjmmkpcn |
Source: unknown | DNS traffic detected: queries for: evetesttech.net |
Source: C:\Users\user\Desktop\bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe | Code function: 0_2_013C5204 InternetOpenA,InternetOpenUrlA,InternetReadFile, | 0_2_013C5204 |
Source: bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe, type: SAMPLE | Matched rule: Detects executables containing potential Windows Defender anti-emulation checks Author: ditekSHen |
Source: 0.0.bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe.13c0000.0.unpack, type: UNPACKEDPE | Matched rule: Detects executables containing potential Windows Defender anti-emulation checks Author: ditekSHen |
Source: 0.0.bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe.13c0000.1.unpack, type: UNPACKEDPE | Matched rule: Detects executables containing potential Windows Defender anti-emulation checks Author: ditekSHen |
Source: 0.2.bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe.13c0000.0.unpack, type: UNPACKEDPE | Matched rule: Detects executables containing potential Windows Defender anti-emulation checks Author: ditekSHen |
Source: 0.0.bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe.13c0000.2.unpack, type: UNPACKEDPE | Matched rule: Detects executables containing potential Windows Defender anti-emulation checks Author: ditekSHen |
Source: bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe | Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe, type: SAMPLE | Matched rule: INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation author = ditekSHen, description = Detects executables containing potential Windows Defender anti-emulation checks |
Source: 0.0.bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe.13c0000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation author = ditekSHen, description = Detects executables containing potential Windows Defender anti-emulation checks |
Source: 0.0.bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe.13c0000.1.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation author = ditekSHen, description = Detects executables containing potential Windows Defender anti-emulation checks |
Source: 0.2.bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe.13c0000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation author = ditekSHen, description = Detects executables containing potential Windows Defender anti-emulation checks |
Source: 0.0.bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe.13c0000.2.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation author = ditekSHen, description = Detects executables containing potential Windows Defender anti-emulation checks |
Source: C:\Users\user\Desktop\bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe | Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5764 -s 1180 |
Source: C:\Users\user\Desktop\bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe | Code function: 0_2_013C112D | 0_2_013C112D |
Source: C:\Users\user\Desktop\bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe | Code function: 0_2_013C91FF | 0_2_013C91FF |
Source: C:\Users\user\Desktop\bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe | Code function: 0_2_013C89FB | 0_2_013C89FB |
Source: C:\Users\user\Desktop\bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe | Code function: 0_2_013E101E | 0_2_013E101E |
Source: C:\Users\user\Desktop\bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe | Code function: 0_2_013D03B0 | 0_2_013D03B0 |
Source: C:\Users\user\Desktop\bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe | Code function: 0_2_013CE3E8 | 0_2_013CE3E8 |
Source: C:\Users\user\Desktop\bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe | Code function: 0_2_013C62E9 | 0_2_013C62E9 |
Source: C:\Users\user\Desktop\bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe | Code function: 0_2_013DED8D | 0_2_013DED8D |
Source: C:\Users\user\Desktop\bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe | Code function: 0_2_013C858A | 0_2_013C858A |
Source: C:\Users\user\Desktop\bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe | Code function: 0_2_013C8427 | 0_2_013C8427 |
Source: C:\Users\user\Desktop\bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe | Code function: 0_2_013C6C73 | 0_2_013C6C73 |
Source: C:\Users\user\Desktop\bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe | Code function: 0_2_013C54FA | 0_2_013C54FA |
Source: C:\Users\user\Desktop\bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe | Code function: 0_2_013C2722 | 0_2_013C2722 |
Source: C:\Users\user\Desktop\bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe | Code function: 0_2_013CA6B7 | 0_2_013CA6B7 |
Source: C:\Users\user\Desktop\bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe | Code function: String function: 013CB030 appears 49 times | |
Source: bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe | ReversingLabs: Detection: 76% |
Source: bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe | Metadefender: Detection: 33% |
Source: bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe | Virustotal: Detection: 65% |
Source: bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe | Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: C:\Users\user\Desktop\bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe | Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: unknown | Process created: C:\Users\user\Desktop\bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe C:\Users\user\Desktop\bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe |
Source: C:\Users\user\Desktop\bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe | Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5764 -s 1180 |
Source: C:\Users\user\Desktop\bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32 | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5764 |
Source: C:\Users\user\Desktop\bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe | Command line argument: Chrome | 0_2_013C951A |
Source: C:\Users\user\Desktop\bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe | Command line argument: Chromium | 0_2_013C951A |
Source: C:\Users\user\Desktop\bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe | Command line argument: Edge | 0_2_013C951A |
Source: C:\Users\user\Desktop\bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe | Command line argument: Kometa | 0_2_013C951A |
Source: C:\Users\user\Desktop\bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe | Command line argument: Vivaldi | 0_2_013C951A |
Source: C:\Users\user\Desktop\bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe | Command line argument: Brave | 0_2_013C951A |
Source: C:\Users\user\Desktop\bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe | Command line argument: Firefox | 0_2_013C951A |
Source: C:\Users\user\Desktop\bfd72bdd4ab311acd0e05211cb01f8671d358540201eb200f613fd80b62291f0_unpacked.exe | Command line argument: Waterfox | 0_2_013C951A |
Source: C:\Users\user\Desktop\bfd72bdd4ab311acd0e05211cb01f86 |