MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 06fc3e8f951fa3855d4056ea043a8de4d24b78df32f4423402305aa516fd56ff. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
LummaStealer
Vendor detections: 15
| SHA256 hash: | 06fc3e8f951fa3855d4056ea043a8de4d24b78df32f4423402305aa516fd56ff |
|---|---|
| SHA3-384 hash: | 20e0fd575c546c83e61236b5bf3815dba2370d5e962fc6cab621f15e55b7e6e408dead04adcafa45ebd856ecea796d8d |
| SHA1 hash: | b7e131f06fd949ed071c745111d5589cd3be7ef9 |
| MD5 hash: | ccf904b9afa2515f1120932e4bd1f148 |
| humanhash: | uniform-winner-missouri-mobile |
| File name: | ccf904b9afa2515f1120932e4bd1f148.exe |
| Download: | download sample |
| Signature | LummaStealer |
| File size: | 7'045'120 bytes |
| First seen: | 2024-12-28 08:27:49 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 2eabe9054cad5152567f0699947a2c5b (2'852 x LummaStealer, 1'312 x Stealc, 1'026 x Healer) |
| ssdeep | 196608:YZXavTeVG5FTdokwbzfD73IYRWVazi4rAySBQ1onE:BLeVmFCkwbzfDL1AyFMySB |
| TLSH | T15B6633B0C7A97509FB79273671F68258E024264FF164B13A517F48B81A0FE64F9A30F9 |
| TrID | 52.9% (.EXE) Win32 Executable (generic) (4504/4/1) 23.5% (.EXE) Generic Win/DOS Executable (2002/3) 23.5% (.EXE) DOS Executable Generic (2000/1) |
| Magika | pebin |
| Reporter | |
| Tags: | exe LummaStealer |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Malware Config
https://cashfuzysao.buzz/api
https://appliacnesot.buzz/api
https://screwamusresz.buzz/api
https://inherineau.buzz/api
https://scentniej.buzz/api
https://rebuildeso.buzz/api
https://prisonyfork.buzz/api
Unpacked files
620a56b42afe5245088bbe070eab84b2ab6e5baaebb28be61c1cf339c7375006
80a8fee2e4d5909bf2dbe60be97d7ea44bbc5d9e3745caf83a06653287ea229c
aea1e74825e2d187e04a81bb5ce56593f5769c4b86218e5fc820d900801abdb4
794ae0a21b8b6845efc55b6afb6b8588452e12b426abf29d2d52ed66db0b175a
147e5a90a4aa996af89ed826f3ce38c8626fe94a291568c45c8df009f9f4b814
23f525572220eef117b077bc9ee2a39729a0b9b3c58543c814084e63bfca8e34
7039e6fb048b2a7511b7095958332a7300cc42e66142b4c815f18cd02b6f1b69
8077581cfece59ca6d8e06d5bedde9664014531a091d3c15732aeae4679dd40e
5866e752f869f91e6084a50c2ee65991de91b9e63f4ea9d1ac9bce9b4123a77d
06fc3e8f951fa3855d4056ea043a8de4d24b78df32f4423402305aa516fd56ff
68e2883db56393de9bd19bb69d5c0f0a4466060af05e20d0ac957361c0568699
bd533aee4fa009263848683ec6c04d34fc4b95318241e5a9a7311f37d699b1cb
bb6ed22605e38edeea643fc3ef43ced73ba96cc3740f8e1d4332932a36d45a41
06fc3e8f951fa3855d4056ea043a8de4d24b78df32f4423402305aa516fd56ff
659f55fe8c0a69b0f6c6440a777b409af34a8206613f7ed31b2b26cd821da339
fe4289d0e93af2b2bd4103c208c7887dfa2e776bc128ba00c8f5626dd386d689
5df0fcaba956997a24d19d6a56e95fb66f63e557627f461105e73e2baeae8e01
a6f505950424c626a2e800ee4d5b50de2e091d6b1f4f8ceeedc0e2e4af6aa6c0
d28fb0737213a89d3afc456a8735eeea48209d4d5ef31f8ec71a2c1796c660a3
befd287cf0e7ea186b496d2db1351ae25d279fa362babe0e0c0a00cb03287111
27a6c8ff6577be009fc1ad64de7c0856cb65407ee79b7fe1a48db58d3fccbc07
a38112572330fc431820c0c9fe01c670e4cf8504edebf8d4e1633299dcc14d5e
87b22dc6e19d8ae5d0a41560d6db0b3d7ae69a6e6a147fb5114b30ddf7710ace
f4d96aca90e5218b27a7d4a539d8ff5a16a6c4b94900bf1044c39254d51174fb
4e06f5dabc7a98dda7645f288f14ad415ad3791cd326940f08361aa1b84ca5ae
ec7755e923c5d31f0d3cd051a8d5fb52e4789d3a96ccd05210d38dea87221824
7ea240b6e590bb8cf4319ddc27b2ac6491ce0802b0cbb07e58bbad99f72e28d3
e285e972bd8877e3a8a5ac1cf4c7034c80c64866310e67131ab76655bbb69ee6
9137185e8f72c20aa75a54554a30ba0f8ab15696e57d4abad6d566df83dd9e89
9eefea2c305ae67db405c3fc3edb461259a9c0ec78b6cf156d084cd5b8eefc71
1f9869d28c20e90e919a1b739f83e96eac0b6d35f0fcdea932150e5fabb5c011
c82c126a95e90e070dc919b5bd4962af4dfb340b8d6f6e83bda42d63bc94eadd
1229329f146db6c61927e88dd7cb1cf4479352bc500f0a44a36d53916d82ee75
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | Sus_Obf_Enc_Spoof_Hide_PE |
|---|---|
| Author: | XiAnzheng |
| Description: | Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP) |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.