MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1d456d0972e2de6cc7d5865c00710a3aa75ee4bde546281387c2b5c73244ef5b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LummaStealer


Vendor detections: 14


Intelligence 14 IOCs YARA 7 File information Comments

SHA256 hash: 1d456d0972e2de6cc7d5865c00710a3aa75ee4bde546281387c2b5c73244ef5b
SHA3-384 hash: c243e63c9237fc783b68cd5be3b8a8d97c2567021e56157492045394cee02563ad6affb666b801061728a6eca971f05d
SHA1 hash: 2baadc4c17a4355da5dbe1fce026deb1f1b1b040
MD5 hash: aee33bd68c717670ae12809740991b09
humanhash: california-michigan-east-william
File name:aee33bd68c717670ae12809740991b09.exe
Download: download sample
Signature LummaStealer
File size:1'794'848 bytes
First seen:2023-11-26 16:35:08 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c7fb2b0f7d1b9bb69de473555ebdc92c (6 x RedLineStealer, 3 x LummaStealer)
ssdeep 24576:NziwJJIRDgPFGXnI3WMKC9ej6a9DhvhSuW:Nziw7PFGXnI3WMA6a3vQH
TLSH T1B8851B1136F94B59F9F31BB95ABAA619083AFC69CF11C2DF1261548E0D21BD08970F3B
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter abuse_ch
Tags:exe LummaStealer


Avatar
abuse_ch
LummaStealer C2:
91.92.249.95:7124

Intelligence


File Origin
# of uploads :
1
# of downloads :
307
Origin country :
NL NL
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Sending a custom TCP request
Modifying a system executable file
Launching a process
Сreating synchronization primitives
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Connecting to a non-recommended domain
Sending an HTTP POST request
Creating a file in the %temp% directory
Creating a process from a recently created file
Searching for synchronization primitives
Creating a window
Unauthorized injection to a recently created process
Infecting executable files
Unauthorized injection to a system process
Enabling autorun by creating a file
Sending an HTTP GET request to an infection source
Gathering data
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
control greyware lolbin overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Glupteba, LummaC Stealer, RedLine, Smoke
Detection:
malicious
Classification:
troj.adwa.spyw.expl.evad.mine
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Connects to a pastebin service (likely for C&C)
Connects to many ports of the same IP (likely port scanning)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
DNS related to crypt mining pools
Encrypted powershell cmdline option found
Found API chain indicative of debugger detection
Found evasive API chain (may stop execution after checking system information)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found Tor onion address
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the hosts file
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses process hollowing technique
Sigma detected: Stop multiple services
Snort IDS alert for network traffic
Suspicious powershell command line found
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
UAC bypass detected (Fodhelper)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Yara detected Glupteba
Yara detected LummaC Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Xmrig cryptocurrency miner
Yara detected zgRAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1347987 Sample: YRIERxBzVv.exe Startdate: 26/11/2023 Architecture: WINDOWS Score: 100 145 xmr-eu1.nanopool.org 2->145 147 pastebin.com 2->147 149 10 other IPs or domains 2->149 187 Snort IDS alert for network traffic 2->187 189 Multi AV Scanner detection for domain / URL 2->189 191 Found malware configuration 2->191 197 23 other signatures 2->197 15 YRIERxBzVv.exe 1 2->15         started        18 DataPointer.exe 2->18         started        20 powershell.exe 2->20         started        22 fuehwuh 2->22         started        signatures3 193 DNS related to crypt mining pools 145->193 195 Connects to a pastebin service (likely for C&C) 147->195 process4 signatures5 243 Contains functionality to inject code into remote processes 15->243 245 Writes to foreign memory regions 15->245 247 Allocates memory in foreign processes 15->247 249 Injects a PE file into a foreign processes 15->249 24 AppLaunch.exe 15->24         started        27 conhost.exe 15->27         started        251 Antivirus detection for dropped file 18->251 253 Multi AV Scanner detection for dropped file 18->253 255 Modifies the context of a thread in another process (thread injection) 18->255 257 Sample uses process hollowing technique 18->257 29 conhost.exe 20->29         started        process6 signatures7 233 Found evasive API chain (may stop execution after checking system information) 24->233 235 Found API chain indicative of debugger detection 24->235 237 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 24->237 239 4 other signatures 24->239 31 explorer.exe 20 30 24->31 injected process8 dnsIp9 157 brusuax.com 2.180.10.7 TCIIR Iran (ISLAMIC Republic Of) 31->157 159 185.196.8.238, 49740, 80 SIMPLECARRER2IT Switzerland 31->159 161 6 other IPs or domains 31->161 107 C:\Users\user\AppData\Roaming\cuehwuh, PE32 31->107 dropped 109 C:\Users\user\AppData\Local\Temp\D84B.exe, PE32 31->109 dropped 111 C:\Users\user\AppData\Local\Temp\BCB4.exe, PE32+ 31->111 dropped 113 12 other files (11 malicious) 31->113 dropped 179 System process connects to network (likely due to code injection or exploit) 31->179 181 Benign windows process drops PE files 31->181 183 Adds a directory exclusion to Windows Defender 31->183 185 Hides that the sample has been downloaded from the Internet (zone.identifier) 31->185 36 D84B.exe 31->36         started        40 BCB4.exe 31->40         started        42 4985.exe 31->42         started        45 5 other processes 31->45 file10 signatures11 process12 dnsIp13 117 C:\Users\user\AppData\Local\Temp\tuc3.exe, PE32 36->117 dropped 119 C:\Users\user\AppData\Local\...\toolspub2.exe, PE32 36->119 dropped 121 C:\Users\user\AppData\Local\...\latestX.exe, PE32+ 36->121 dropped 123 C:\...\31839b57a4f11171d6abc8bbc4451ee4.exe, PE32 36->123 dropped 199 Multi AV Scanner detection for dropped file 36->199 47 tuc3.exe 36->47         started        51 31839b57a4f11171d6abc8bbc4451ee4.exe 36->51         started        53 toolspub2.exe 36->53         started        63 2 other processes 36->63 201 Found many strings related to Crypto-Wallets (likely being stolen) 40->201 203 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 40->203 205 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 40->205 217 2 other signatures 40->217 55 BCB4.exe 40->55         started        151 5.42.65.101 RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU Russian Federation 42->151 207 Antivirus detection for dropped file 42->207 209 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 42->209 211 Machine Learning detection for dropped file 42->211 213 Tries to harvest and steal browser information (history, passwords, etc) 42->213 153 194.49.94.80, 42359, 49744 EQUEST-ASNL unknown 45->153 155 194.169.175.235, 42691, 49741 CLOUDCOMPUTINGDE Germany 45->155 125 C:\Users\user\AppData\Local\Temp\...\6088.tmp, PE32 45->125 dropped 215 Tries to steal Crypto Currency Wallets 45->215 57 conhost.exe 45->57         started        59 conhost.exe 45->59         started        61 conhost.exe 45->61         started        65 2 other processes 45->65 file14 signatures15 process16 file17 139 C:\Users\user\AppData\Local\Temp\...\tuc3.tmp, PE32 47->139 dropped 163 Multi AV Scanner detection for dropped file 47->163 67 tuc3.tmp 47->67         started        165 Antivirus detection for dropped file 51->165 167 Detected unpacking (changes PE section rights) 51->167 169 Detected unpacking (overwrites its own PE header) 51->169 177 4 other signatures 51->177 69 cmd.exe 51->69         started        171 Injects a PE file into a foreign processes 53->171 71 toolspub2.exe 53->71         started        74 cmd.exe 55->74         started        141 C:\Program Filesbehaviorgraphoogle\Chrome\updater.exe, PE32+ 63->141 dropped 143 C:\Windows\System32\drivers\etc\hosts, ASCII 63->143 dropped 173 Modifies the hosts file 63->173 175 Adds a directory exclusion to Windows Defender 63->175 signatures18 process19 signatures20 76 tuc3.exe 67->76         started        79 conhost.exe 69->79         started        81 fodhelper.exe 69->81         started        83 fodhelper.exe 69->83         started        225 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 71->225 227 Maps a DLL or memory area into another process 71->227 229 Checks if the current machine is a virtual machine (disk enumeration) 71->229 231 Creates a thread in another existing process (thread injection) 71->231 85 BCB4.exe 74->85         started        88 conhost.exe 74->88         started        process21 file22 137 C:\Users\user\AppData\Local\Temp\...\tuc3.tmp, PE32 76->137 dropped 90 tuc3.tmp 76->90         started        219 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 85->219 221 Modifies the context of a thread in another process (thread injection) 85->221 223 Injects a PE file into a foreign processes 85->223 94 BCB4.exe 85->94         started        signatures23 process24 file25 127 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 90->127 dropped 129 C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32 90->129 dropped 131 C:\Users\user\AppData\Local\...\_RegDLL.tmp, PE32 90->131 dropped 135 12 other files (11 malicious) 90->135 dropped 241 Uses schtasks.exe or at.exe to add and modify task schedules 90->241 96 TVSmile.exe 90->96         started        99 net.exe 90->99         started        101 schtasks.exe 90->101         started        103 TVSmile.exe 90->103         started        133 C:\Users\user\AppData\...\DataPointer.exe, PE32+ 94->133 dropped signatures26 process27 file28 115 C:\ProgramData\SpaceRaces\SpaceRaces.exe, PE32 96->115 dropped 105 conhost.exe 101->105         started        process29
Threat name:
Win32.Trojan.RedlineStealer
Status:
Malicious
First seen:
2023-11-22 21:22:36 UTC
File Type:
PE (Exe)
AV detection:
24 of 37 (64.86%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
Score:
  10/10
Tags:
family:eternity family:glupteba family:redline family:smokeloader family:xmrig family:zgrat botnet:@ytlogsbot botnet:lfa botnet:livetraffic botnet:up3 backdoor discovery dropper evasion infostealer loader miner persistence rat rootkit spyware stealer trojan upx
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Modifies data under HKEY_USERS
Modifies system certificate store
Runs net.exe
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: LoadsDriver
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Enumerates physical storage devices
Program crash
Checks for VirtualBox DLLs, possible anti-VM trick
Drops file in Program Files directory
Drops file in Windows directory
Launches sc.exe
Drops file in System32 directory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Manipulates WinMon driver.
Manipulates WinMonFS driver.
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
UPX packed file
Windows security modification
Downloads MZ/PE file
Drops file in Drivers directory
Modifies Windows Firewall
Possible attempt to disable PatchGuard
Stops running service(s)
Modifies boot configuration data using bcdedit
XMRig Miner payload
Detect ZGRat V1
Eternity
Glupteba
Glupteba payload
RedLine
RedLine payload
SmokeLoader
Suspicious use of NtCreateUserProcessOtherParentProcess
Windows security bypass
ZGRat
xmrig
Malware Config
C2 Extraction:
http://194.49.94.210/fks/index.php
194.169.175.235:42691
http://host-file-host6.com/
http://host-host-file8.com/
195.10.205.16:1056
91.92.249.95:7124
Unpacked files
SH256 hash:
1d456d0972e2de6cc7d5865c00710a3aa75ee4bde546281387c2b5c73244ef5b
MD5 hash:
aee33bd68c717670ae12809740991b09
SHA1 hash:
2baadc4c17a4355da5dbe1fce026deb1f1b1b040
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:NET
Author:malware-lu
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:pe_no_import_table
Description:Detect pe file that no import table
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments