MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1824e5015f86de2efab633fa3e0d8a43d7ab980fa200a77008eb2e39a66909e0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LummaStealer


Vendor detections: 15


Intelligence 15 IOCs YARA 2 File information Comments

SHA256 hash: 1824e5015f86de2efab633fa3e0d8a43d7ab980fa200a77008eb2e39a66909e0
SHA3-384 hash: 0d7551b171e648ce9767c3769b310492ad11cf3b4d123678b89bb4f9a7f94a0639db610bb9e017f89f5ab5aa5d330a48
SHA1 hash: a0d52683c28d4bd6ca098592f36a0ccb4a0d3142
MD5 hash: 4a60ce8e60857e32c0c7a6ebd2ac119e
humanhash: washington-magazine-north-spring
File name:4a60ce8e60857e32c0c7a6ebd2ac119e.exe
Download: download sample
Signature LummaStealer
File size:1'296'896 bytes
First seen:2023-12-11 00:20:28 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader)
ssdeep 24576:0y21NUQPd4O7ecCW91WzRKtb2yXRDPw1NFpSUC1rr7pL5M7o4BbWx:DYTDK7W91WzRKBzDirTabhaBb
TLSH T142552313BAD04022C87967B019F6064B1B3BFCF0A8BA565B6FE69D921CF13D51872376
TrID 41.1% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
22.2% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
11.8% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
7.5% (.EXE) Win64 Executable (generic) (10523/12/4)
4.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
File icon (PE):PE icon
dhash icon f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader)
Reporter abuse_ch
Tags:exe LummaStealer


Avatar
abuse_ch
LummaStealer C2:
http://castlesideopwas.pw/api

Intelligence


File Origin
# of uploads :
1
# of downloads :
315
Origin country :
NL NL
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Creating a file in the Windows subdirectories
Сreating synchronization primitives
Modifying a system file
Creating a file
Launching a process
Replacing files
Launching a service
DNS request
Sending a custom TCP request
Sending a UDP request
Sending an HTTP GET request
Reading critical registry keys
Forced system process termination
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Blocking the Windows Defender launch
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Sending a TCP request to an infection source
Stealing user critical data
Adding exclusions to Windows Defender
Enabling autorun by creating a file
Gathering data
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
advpack anti-vm autoit CAB control explorer greyware installer installer keylogger lolbin packed rundll32 setupapi sfx shell32 xpack
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Glupteba, PrivateLoader, RedLine, RisePr
Detection:
malicious
Classification:
troj.spyw.expl.evad.mine
Score:
100 / 100
Signature
.NET source code contains very large array initializations
Adds extensions / path to Windows Defender exclusion list (Registry)
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject threads in other processes
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender real time protection (registry)
Disables Windows Defender (deletes autostart)
Exclude list of file types from scheduled, custom, and real-time scanning
Found malware configuration
Found stalling execution ending in API Sleep call
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies Group Policy settings
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses process hollowing technique
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
UAC bypass detected (Fodhelper)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Glupteba
Yara detected PrivateLoader
Yara detected RedLine Stealer
Yara detected RisePro Stealer
Yara detected SmokeLoader
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1357989 Sample: XMDiLyz5vC.exe Startdate: 11/12/2023 Architecture: WINDOWS Score: 100 119 ipinfo.io 2->119 143 Snort IDS alert for network traffic 2->143 145 Multi AV Scanner detection for domain / URL 2->145 147 Found malware configuration 2->147 149 16 other signatures 2->149 12 XMDiLyz5vC.exe 1 4 2->12         started        16 OfficeTrackerNMP131.exe 10 501 2->16         started        19 OfficeTrackerNMP131.exe 2->19         started        21 10 other processes 2->21 signatures3 process4 dnsIp5 111 C:\Users\user\AppData\Local\...\IN7IH24.exe, PE32 12->111 dropped 113 C:\Users\user\AppData\Local\...\6kS9vs8.exe, PE32 12->113 dropped 193 Binary is likely a compiled AutoIt script file 12->193 23 IN7IH24.exe 1 4 12->23         started        117 ipinfo.io 34.117.59.81, 443, 49712, 49713 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 16->117 115 C:\...\32cqdAMmFcm8jNNBQLzFG5mXjnN5vZh4.zip, Zip 16->115 dropped 195 Antivirus detection for dropped file 16->195 197 Multi AV Scanner detection for dropped file 16->197 199 Tries to steal Mail credentials (via file / registry access) 16->199 209 4 other signatures 16->209 27 WerFault.exe 16->27         started        201 Disables Windows Defender (deletes autostart) 19->201 203 Tries to harvest and steal browser information (history, passwords, etc) 19->203 205 Exclude list of file types from scheduled, custom, and real-time scanning 19->205 207 Machine Learning detection for dropped file 21->207 29 WerFault.exe 21->29         started        31 WerFault.exe 21->31         started        33 Conhost.exe 21->33         started        file6 signatures7 process8 file9 87 C:\Users\user\AppData\Local\...\4Fj223YC.exe, PE32 23->87 dropped 89 C:\Users\user\AppData\Local\...\1uu23kN5.exe, PE32 23->89 dropped 181 Antivirus detection for dropped file 23->181 183 Multi AV Scanner detection for dropped file 23->183 185 Machine Learning detection for dropped file 23->185 35 4Fj223YC.exe 23->35         started        38 1uu23kN5.exe 11 508 23->38         started        signatures10 process11 dnsIp12 151 Antivirus detection for dropped file 35->151 153 Multi AV Scanner detection for dropped file 35->153 155 Machine Learning detection for dropped file 35->155 163 4 other signatures 35->163 42 explorer.exe 35->42 injected 121 193.233.132.51, 49708, 49709, 49710 FREE-NET-ASFREEnetEU Russian Federation 38->121 91 C:\Users\user\AppData\...\FANBooster131.exe, PE32 38->91 dropped 93 C:\Users\user\AppData\...\MaxLoonaFest131.exe, PE32 38->93 dropped 95 C:\ProgramData\...\OfficeTrackerNMP131.exe, PE32 38->95 dropped 97 2 other malicious files 38->97 dropped 157 Tries to steal Mail credentials (via file / registry access) 38->157 159 Found stalling execution ending in API Sleep call 38->159 161 Disables Windows Defender (deletes autostart) 38->161 165 7 other signatures 38->165 47 schtasks.exe 1 38->47         started        49 schtasks.exe 1 38->49         started        51 WerFault.exe 38->51         started        file13 signatures14 process15 dnsIp16 127 185.172.128.19, 49731, 80 NADYMSS-ASRU Russian Federation 42->127 129 81.19.131.34, 49730, 80 IVC-ASRU Russian Federation 42->129 103 C:\Users\user\AppData\Local\Temp\F628.exe, PE32 42->103 dropped 105 C:\Users\user\AppData\Local\Temp128.exe, PE32 42->105 dropped 107 C:\Users\user\AppData\Local\Temp\D3C9.exe, PE32 42->107 dropped 109 2 other malicious files 42->109 dropped 187 System process connects to network (likely due to code injection or exploit) 42->187 189 Benign windows process drops PE files 42->189 53 C5FD.exe 42->53         started        57 D3C9.exe 42->57         started        60 8D77.exe 42->60         started        62 conhost.exe 47->62         started        64 conhost.exe 49->64         started        file17 signatures18 process19 dnsIp20 79 C:\Users\user\AppData\Local\Temp\tuc3.exe, PE32 53->79 dropped 81 C:\Users\user\AppData\Local\...\toolspub2.exe, PE32 53->81 dropped 83 C:\Users\user\AppData\Local\...\latestX.exe, PE32+ 53->83 dropped 85 2 other malicious files 53->85 dropped 167 Antivirus detection for dropped file 53->167 169 Multi AV Scanner detection for dropped file 53->169 171 Machine Learning detection for dropped file 53->171 66 31839b57a4f11171d6abc8bbc4451ee4.exe 53->66         started        69 toolspub2.exe 53->69         started        71 InstallSetup9.exe 53->71         started        74 2 other processes 53->74 123 176.123.7.190 ALEXHOSTMD Moldova Republic of 57->123 173 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 57->173 175 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 57->175 177 Tries to harvest and steal browser information (history, passwords, etc) 57->177 179 Tries to steal Crypto Currency Wallets 57->179 125 77.105.132.87 PLUSTELECOM-ASRU Russian Federation 60->125 file21 signatures22 process23 file24 131 Antivirus detection for dropped file 66->131 133 Multi AV Scanner detection for dropped file 66->133 135 Detected unpacking (changes PE section rights) 66->135 141 3 other signatures 66->141 137 Sample uses process hollowing technique 69->137 139 Injects a PE file into a foreign processes 69->139 99 C:\Users\user\AppData\Local\Temp\Broom.exe, PE32 71->99 dropped 76 Broom.exe 71->76         started        101 C:\Users\user\AppData\Local\Temp\...\tuc3.tmp, PE32 74->101 dropped signatures25 process26 signatures27 191 Multi AV Scanner detection for dropped file 76->191
Threat name:
Win32.Trojan.RisePro
Status:
Malicious
First seen:
2023-12-10 18:56:17 UTC
File Type:
PE (Exe)
Extracted files:
101
AV detection:
21 of 37 (56.76%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:eternity family:glupteba family:privateloader family:redline family:risepro family:smokeloader botnet:@oleh_ps botnet:livetraffic botnet:up3 backdoor brand:google collection discovery dropper evasion infostealer loader persistence phishing spyware stealer trojan
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Creates scheduled task(s)
Enumerates system info in registry
Modifies Internet Explorer settings
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Program crash
AutoIT Executable
Drops file in System32 directory
Accesses Microsoft Outlook profiles
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Looks up external IP address via web service
Drops startup file
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Downloads MZ/PE file
Modifies Windows Firewall
Detected google phishing page
Eternity
Glupteba
Glupteba payload
PrivateLoader
RedLine
RedLine payload
RisePro
SmokeLoader
Malware Config
C2 Extraction:
193.233.132.51
http://81.19.131.34/fks/index.php
77.105.132.87:6731
176.123.7.190:32927
http://host-file-host6.com/
http://host-host-file8.com/
Unpacked files
SH256 hash:
fc3e7e13b86b49af3b45bbba34e58a2167715a33f0eade6020c7c55663aea34b
MD5 hash:
36930c536c2a81c68839a4f0a02e683c
SHA1 hash:
87afbc08b78894bf5e7ded12b5ae0eba2e6ea86c
SH256 hash:
4794f01854d68638eead5b2abfd7c02db9da1585ab628813ba10cd1496f8934c
MD5 hash:
cccb37034bd8baa0d407277b09866269
SHA1 hash:
7462c0fcdf32741f3592d1ef68a74d83860bac75
Detections:
win_smokeloader_a2
SH256 hash:
f5ee614ae3f48b872eb41a10b1f4e70920e3b6a0880d9b164082ab34c36a485b
MD5 hash:
eefeac084e594faf0891ff2800ca05b1
SHA1 hash:
b2929ca5c2ee3d4db90936343726a77cabf9e050
Detections:
AutoIT_Compiled
SH256 hash:
1824e5015f86de2efab633fa3e0d8a43d7ab980fa200a77008eb2e39a66909e0
MD5 hash:
4a60ce8e60857e32c0c7a6ebd2ac119e
SHA1 hash:
a0d52683c28d4bd6ca098592f36a0ccb4a0d3142
Detections:
win_redline_wextract_hunting_oct_2023
Malware family:
PrivateLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:detect_Redline_Stealer
Author:Varp0s
Rule name:win_redline_wextract_hunting_oct_2023
Author:Matthew @ Embee_Research
Description:Detects wextract archives related to redline/amadey

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

LummaStealer

Executable exe 1824e5015f86de2efab633fa3e0d8a43d7ab980fa200a77008eb2e39a66909e0

(this sample)

  
Delivery method
Distributed via web download

Comments