MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 24b671e05fc7f6f0bf06c3d7c6dff686208821c07342ba15e2633f3fc3deb0bd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LummaStealer


Vendor detections: 11


Intelligence 11 IOCs YARA 2 File information Comments

SHA256 hash: 24b671e05fc7f6f0bf06c3d7c6dff686208821c07342ba15e2633f3fc3deb0bd
SHA3-384 hash: 806eaaf2d4751d1cf78a50b3e38117607df121c5beac7696aa0881a770f940f1eb1984f96da262154e77e50a196c91f5
SHA1 hash: 2c85a5c5089b38817044c90a204ce285d25e955d
MD5 hash: 95dc60868af1e69c7c960d6615be4c2b
humanhash: nitrogen-shade-sweet-monkey
File name:95DC60868AF1E69C7C960D6615BE4C2B.exe
Download: download sample
Signature LummaStealer
File size:2'916'864 bytes
First seen:2023-12-03 19:35:19 UTC
Last seen:2023-12-03 21:36:26 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash daffa07f4866e55483a8d9259c73c697 (1 x LummaStealer)
ssdeep 49152:J6d4eQvjVKtkxtUW9SfNcxqo5gQtGxTVuKb2kCtu44nd6n8cw:sd4rGpBoW1VuKbCAd6nN
TLSH T174D52246B68CD6ACE1E86AF60307EE2F70723F39C961890D62A4F74F5C764529533A13
TrID 42.7% (.EXE) Win32 Executable (generic) (4505/5/1)
19.2% (.EXE) OS/2 Executable (generic) (2029/13)
19.0% (.EXE) Generic Win/DOS Executable (2002/3)
18.9% (.EXE) DOS Executable Generic (2000/1)
File icon (PE):PE icon
dhash icon b4e4644ef471e6e4 (1 x LummaStealer)
Reporter abuse_ch
Tags:exe LummaStealer


Avatar
abuse_ch
LummaStealer C2:
http://89.208.107.12/SOSORRY.php

Intelligence


File Origin
# of uploads :
2
# of downloads :
339
Origin country :
NL NL
Vendor Threat Intelligence
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
DNS request
Sending an HTTP POST request
Query of malicious DNS domain
Gathering data
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
crypto greyware packed packed vmprotect
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
malicious
Classification:
expl
Score:
84 / 100
Signature
Antivirus detection for URL or domain
Contains functionality to behave differently if execute on a Russian/Kazak computer
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Snort IDS alert for network traffic
Behaviour
Behavior Graph:
Threat name:
Win32.Spyware.Lummastealer
Status:
Malicious
First seen:
2023-11-29 09:26:46 UTC
File Type:
PE (Exe)
Extracted files:
76
AV detection:
25 of 37 (67.57%)
Threat level:
  2/5
Verdict:
suspicious
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Unpacked files
SH256 hash:
0fc3cdffa9393e2ece8abf9fe496edacb189ab9290461841eaf11092c9dfd517
MD5 hash:
f2d4fc230a550c478b7dd35f8f6f33a3
SHA1 hash:
db73fd202cf6f2065dcf07b51c5455d054a74739
SH256 hash:
24b671e05fc7f6f0bf06c3d7c6dff686208821c07342ba15e2633f3fc3deb0bd
MD5 hash:
95dc60868af1e69c7c960d6615be4c2b
SHA1 hash:
2c85a5c5089b38817044c90a204ce285d25e955d
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments