Report - 2.exe

Lumma Stealer UPX PE File PE32
ScreenShot
Created 2024.07.10 07:36 Machine s1_win7_x6403
Filename 2.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
11
Behavior Score
1.2
ZERO API file : clean
VT API (file) 52 detected (AIDetectMalware, LummaStealer, Windows, Lumma, Malicious, score, Unsafe, Lazy, Vwhq, Attribute, HighConfidence, ccmw, K9ydldTp3hR, XPACK, YXEGIZ, Real Protect, high, Detected, ai score=81, ABTrojan, SEIS, Lcnw, susgen, confidence)
md5 536b6b4464f2476d693267bd71d9a1ee
sha256 cced1a3811e37720251db4e3d5836ea94da430682863ca61b2ff9940b7d56965
ssdeep 3072:1C8qwqXilndJxQb3id0j0ivCjVoEJX47puEuGcSHs2p3pqKccdlVDOdhslwZ4Y7V:jpldJxQyd0gCCxoYlEuwsscGl+hr3
imphash ff120d96cb39498bfde3c6d322aff8f2
impfuzzy 12:oZG5TZtJjqTleH4wxrPTkimzdwdV3EQg3EiA/tHqH3Q4oA7QNt25hDLO1UkH:YY17l4wxzTCqvEQ4EPlZ4Fk/wh3MUkH
  Network IP location

Signature (1cnts)

Level Description
danger File has been identified by 52 AntiVirus engines on VirusTotal as malicious

Rules (4cnts)

Level Name Description Collection
danger lumma_Stealer Lumma Stealer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x43a7d4 ExitProcess
 0x43a7d8 GetCurrentProcessId
 0x43a7dc GetCurrentThreadId
 0x43a7e0 GetLogicalDrives
 0x43a7e4 GetProcessVersion
 0x43a7e8 GetSystemDirectoryW
 0x43a7ec GlobalLock
 0x43a7f0 GlobalUnlock
ole32.dll
 0x43a7f8 CoCreateInstance
 0x43a7fc CoInitializeEx
 0x43a800 CoInitializeSecurity
 0x43a804 CoSetProxyBlanket
 0x43a808 CoUninitialize
OLEAUT32.dll
 0x43a810 SysAllocString
 0x43a814 SysFreeString
 0x43a818 SysStringLen
 0x43a81c VariantClear
 0x43a820 VariantInit
USER32.dll
 0x43a828 CloseClipboard
 0x43a82c GetClipboardData
 0x43a830 GetDC
 0x43a834 GetSystemMetrics
 0x43a838 GetWindowLongW
 0x43a83c OpenClipboard
 0x43a840 ReleaseDC
GDI32.dll
 0x43a848 BitBlt
 0x43a84c CreateCompatibleBitmap
 0x43a850 CreateCompatibleDC
 0x43a854 DeleteDC
 0x43a858 DeleteObject
 0x43a85c GetCurrentObject
 0x43a860 GetDIBits
 0x43a864 GetObjectW
 0x43a868 SelectObject

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure