MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0cd1c97c405a01a4f7b54760f30aab6ca71396ca7a473b27fa85320e66f319c8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LummaStealer


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: 0cd1c97c405a01a4f7b54760f30aab6ca71396ca7a473b27fa85320e66f319c8
SHA3-384 hash: 9391e6728b0dd18f40faee133812d9016fb672cb07dfb07fc2ac6e361c64d8db95c5e4851bd93b9acf141e1d093791cf
SHA1 hash: 8464c6d258f14f3002407e76359560a53e8b223b
MD5 hash: e423336a6931c0ef690935458b62d75c
humanhash: sweet-hawaii-sixteen-april
File name:e423336a6931c0ef690935458b62d75c.exe
Download: download sample
Signature LummaStealer
File size:1'073'168 bytes
First seen:2023-02-13 08:27:35 UTC
Last seen:2023-02-13 10:42:49 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 0992ce2778ae787bb96d086c5eb37d54 (1 x RedLineStealer, 1 x LummaStealer)
ssdeep 6144:Ze7RhGRRskQlJzXahRI5AOZ0Ww/GF5O+xL3q3xSL1TH8x8l3c:07RhGRRsVN555OkruxSBTH8Cls
Threatray 24 similar samples on MalwareBazaar
TLSH T1BE35BF0F75D2B433C0F21438F8E0AA7B4F3E79A10AE58B6B6B850E6D3F632519571169
TrID 32.2% (.EXE) Win64 Executable (generic) (10523/12/4)
20.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
15.4% (.EXE) Win16 NE executable (generic) (5038/12/1)
13.7% (.EXE) Win32 Executable (generic) (4505/5/1)
6.2% (.EXE) OS/2 Executable (generic) (2029/13)
Reporter abuse_ch
Tags:exe LummaStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
201
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
e423336a6931c0ef690935458b62d75c.exe
Verdict:
No threats detected
Analysis date:
2023-02-13 08:28:49 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Launching a process
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Creating a window
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
CheckCmdLine
EvasionQueryPerformanceCounter
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
80%
Tags:
greyware overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
LummaC2 Stealer
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.spyw.evad
Score:
80 / 100
Signature
Allocates memory in foreign processes
Contains functionality to inject code into remote processes
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Tries to harvest and steal browser information (history, passwords, etc)
Uses known network protocols on non-standard ports
Writes to foreign memory regions
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.RedLine
Status:
Malicious
First seen:
2023-02-13 08:28:08 UTC
File Type:
PE (Exe)
AV detection:
21 of 26 (80.77%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Uses the VBS compiler for execution
Unpacked files
SH256 hash:
356959553ae636d3a6eb45fc4d84c122f5dd42979f8071b7709a0918f1ee840f
MD5 hash:
90e09e743c457d352649b141c3e4b2d2
SHA1 hash:
cc2399a65927c03ec04ca52cf9e04cb18ae262dd
SH256 hash:
0cd1c97c405a01a4f7b54760f30aab6ca71396ca7a473b27fa85320e66f319c8
MD5 hash:
e423336a6931c0ef690935458b62d75c
SHA1 hash:
8464c6d258f14f3002407e76359560a53e8b223b
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments