MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 261844b03152e938733e6cabfe09e1cc3eca03c905a9e4509c2239291b7306f9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LummaStealer


Vendor detections: 18


Intelligence 18 IOCs YARA 7 File information Comments

SHA256 hash: 261844b03152e938733e6cabfe09e1cc3eca03c905a9e4509c2239291b7306f9
SHA3-384 hash: 264966160e217a492ee7a706066ae7b6edeb8bbbedc19c6c5db36212c873d9af6870b9dc6ac5a9e7eab9686d768e86cf
SHA1 hash: 9a69807c8a36b22210a77b4c5a61e41f90f17b6e
MD5 hash: 0823e9587171e990fe3d25789d893542
humanhash: leopard-friend-chicken-echo
File name:0823e9587171e990fe3d25789d893542.exe
Download: download sample
Signature LummaStealer
File size:2'478'080 bytes
First seen:2023-12-12 02:30:20 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader)
ssdeep 49152:sykm9ZHI+xPB+KRiV1xjML/F6bjN1n4yy5eYqZH1C:3km75xhidQYNzrY
TLSH T1BBB5334773E98835E9B9773097F207A3A736AE620DB4531B63A0D81A0CF13A0747A75D
TrID 41.1% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
22.2% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
11.8% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
7.5% (.EXE) Win64 Executable (generic) (10523/12/4)
4.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
File icon (PE):PE icon
dhash icon f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader)
Reporter abuse_ch
Tags:exe LummaStealer


Avatar
abuse_ch
LummaStealer C2:
http://scanintegrutybatowss.pw/api

Intelligence


File Origin
# of uploads :
1
# of downloads :
400
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
703db2671a8c5d8ad5d143403048f9a4.exe
Verdict:
Malicious activity
Analysis date:
2023-12-12 02:08:13 UTC
Tags:
loader smoke smokeloader risepro stealer evasion

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Creating a file in the Windows subdirectories
Сreating synchronization primitives
Modifying a system file
Creating a file
Replacing files
Launching a process
Launching a service
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Sending a UDP request
Reading critical registry keys
Forced system process termination
Launching the default Windows debugger (dwwin.exe)
Blocking the Windows Defender launch
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Sending a TCP request to an infection source
Stealing user critical data
Adding exclusions to Windows Defender
Enabling autorun by creating a file
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
91%
Tags:
advpack anti-vm autoit CAB control explorer greyware installer installer keylogger lolbin packed rundll32 setupapi sfx shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
PrivateLoader, RedLine, RisePro Stealer,
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
Adds extensions / path to Windows Defender exclusion list (Registry)
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Binary is likely a compiled AutoIt script file
Contains functionality to inject threads in other processes
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender (deletes autostart)
Disables Windows Defender Tamper protection
Exclude list of file types from scheduled, custom, and real-time scanning
Found stalling execution ending in API Sleep call
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies Group Policy settings
Modifies windows update settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected PrivateLoader
Yara detected RedLine Stealer
Yara detected RisePro Stealer
Yara detected SmokeLoader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1359429 Sample: TpqvVwsi4F.exe Startdate: 12/12/2023 Architecture: WINDOWS Score: 100 87 ipinfo.io 2->87 93 Snort IDS alert for network traffic 2->93 95 Malicious sample detected (through community Yara rule) 2->95 97 Antivirus detection for dropped file 2->97 99 11 other signatures 2->99 12 TpqvVwsi4F.exe 1 4 2->12         started        16 OfficeTrackerNMP131.exe 10 501 2->16         started        18 OfficeTrackerNMP131.exe 2->18         started        20 7 other processes 2->20 signatures3 process4 file5 73 C:\Users\user\AppData\Local\...\nQ5RL66.exe, PE32 12->73 dropped 75 C:\Users\user\AppData\Local\...\7RG5fT76.exe, PE32 12->75 dropped 117 Binary is likely a compiled AutoIt script file 12->117 22 nQ5RL66.exe 1 4 12->22         started        119 Multi AV Scanner detection for dropped file 16->119 121 Detected unpacking (changes PE section rights) 16->121 123 Detected unpacking (overwrites its own PE header) 16->123 133 5 other signatures 16->133 26 WerFault.exe 16->26         started        77 C:\...\OIaAPqiIWQhj59ONyzxwKYAlZfmtZLo4.zip, Zip 18->77 dropped 125 Tries to steal Mail credentials (via file / registry access) 18->125 127 Disables Windows Defender (deletes autostart) 18->127 129 Tries to harvest and steal browser information (history, passwords, etc) 18->129 28 WerFault.exe 18->28         started        131 Machine Learning detection for dropped file 20->131 30 WerFault.exe 20->30         started        32 WerFault.exe 20->32         started        34 WerFault.exe 20->34         started        signatures6 process7 file8 65 C:\Users\user\AppData\Local\...\oB9iy38.exe, PE32 22->65 dropped 67 C:\Users\user\AppData\Local\...\5oZ1uS0.exe, PE32 22->67 dropped 107 Antivirus detection for dropped file 22->107 109 Multi AV Scanner detection for dropped file 22->109 111 Machine Learning detection for dropped file 22->111 36 oB9iy38.exe 1 4 22->36         started        signatures9 process10 file11 61 C:\Users\user\AppData\Local\...j5oi13.exe, PE32 36->61 dropped 63 C:\Users\user\AppData\Local\...\4ra166fh.exe, PE32 36->63 dropped 101 Antivirus detection for dropped file 36->101 103 Multi AV Scanner detection for dropped file 36->103 105 Machine Learning detection for dropped file 36->105 40 Ej5oi13.exe 1 4 36->40         started        signatures12 process13 file14 69 C:\Users\user\AppData\Local\...\3IR61wU.exe, PE32 40->69 dropped 71 C:\Users\user\AppData\Local\...\1cn83gd8.exe, PE32 40->71 dropped 113 Multi AV Scanner detection for dropped file 40->113 115 Machine Learning detection for dropped file 40->115 44 1cn83gd8.exe 11 508 40->44         started        49 3IR61wU.exe 40->49         started        signatures15 process16 dnsIp17 89 193.233.132.51, 49729, 49730, 49731 FREE-NET-ASFREEnetEU Russian Federation 44->89 91 ipinfo.io 34.117.59.81, 443, 49732, 49733 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 44->91 79 C:\Users\user\AppData\...\FANBooster131.exe, PE32 44->79 dropped 81 C:\Users\user\AppData\...\MaxLoonaFest131.exe, PE32 44->81 dropped 83 C:\ProgramData\...\OfficeTrackerNMP131.exe, PE32 44->83 dropped 85 2 other malicious files 44->85 dropped 135 Multi AV Scanner detection for dropped file 44->135 137 Detected unpacking (changes PE section rights) 44->137 139 Detected unpacking (overwrites its own PE header) 44->139 149 9 other signatures 44->149 51 schtasks.exe 1 44->51         started        53 schtasks.exe 1 44->53         started        55 WerFault.exe 44->55         started        141 Machine Learning detection for dropped file 49->141 143 Modifies windows update settings 49->143 145 Disables Windows Defender Tamper protection 49->145 147 Disable Windows Defender notifications (registry) 49->147 file18 signatures19 process20 process21 57 conhost.exe 51->57         started        59 conhost.exe 53->59         started       
Threat name:
Win32.Trojan.SmokeLoader
Status:
Malicious
First seen:
2023-12-12 02:31:08 UTC
File Type:
PE (Exe)
Extracted files:
208
AV detection:
17 of 23 (73.91%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
Score:
  10/10
Tags:
family:privateloader family:redline family:risepro family:smokeloader family:zgrat botnet:@oleh_ps botnet:livetraffic botnet:up3 backdoor brand:google collection discovery evasion infostealer loader persistence phishing rat spyware stealer trojan
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Checks SCSI registry key(s)
Checks processor information in registry
Creates scheduled task(s)
Enumerates system info in registry
Modifies Internet Explorer settings
Modifies system certificate store
Runs net.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Enumerates physical storage devices
Program crash
AutoIT Executable
Drops file in System32 directory
Accesses Microsoft Outlook profiles
Adds Run key to start application
Checks installed software on the system
Looks up external IP address via web service
.NET Reactor proctector
Drops startup file
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Windows security modification
Downloads MZ/PE file
Detect ZGRat V1
Detected google phishing page
Modifies Windows Defender Real-time Protection settings
PrivateLoader
RedLine
RedLine payload
RisePro
SmokeLoader
ZGRat
Malware Config
C2 Extraction:
193.233.132.51
http://81.19.131.34/fks/index.php
176.123.7.190:32927
77.105.132.87:17066
Unpacked files
SH256 hash:
0d28f4b1fe3e647c35d482f56d1e815f54c68154f81b7fcca1d2c478d49cd135
MD5 hash:
12a9f626511424d4d73f70314ccfabdd
SHA1 hash:
bc82f584a736273a58ed6f41159a2fe0a4e61f40
SH256 hash:
66abab611bd8fd9f161292c56c6ade4d5ec022b8acbfe3da6872859c39b14269
MD5 hash:
c715cf983117af77d99c386a3b354556
SHA1 hash:
dbc872924ec00aa0010b3f36a16b80c7e0978050
Detections:
MAL_Malware_Imphash_Mar23_1 MALWARE_Win_RedLine
SH256 hash:
e41b515beab1dc3e7354aa4826f5094dd66834aa0b088c8708c5f4e752da110c
MD5 hash:
37c2cdf44148df68e4c4d970fe942fcd
SHA1 hash:
949a697058e1d444cfce964c6af408c20d41d50e
SH256 hash:
6cc185aa9cce5c81f776c59e4e2982ee4db7c6de70212c8666757b9ab56eb0df
MD5 hash:
e791275d912ba5d5b55ecaff46577a39
SHA1 hash:
e27a8f5ae1dad1d9f5baa33231e01f576bef5393
Detections:
win_smokeloader_a2
SH256 hash:
261844b03152e938733e6cabfe09e1cc3eca03c905a9e4509c2239291b7306f9
MD5 hash:
0823e9587171e990fe3d25789d893542
SHA1 hash:
9a69807c8a36b22210a77b4c5a61e41f90f17b6e
Detections:
win_redline_wextract_hunting_oct_2023
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Check_OutputDebugStringA_iat
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:detect_Redline_Stealer
Author:Varp0s
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:Windows_Trojan_Smokeloader_3687686f
Author:Elastic Security
Rule name:win_redline_wextract_hunting_oct_2023
Author:Matthew @ Embee_Research
Description:Detects wextract archives related to redline/amadey

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

LummaStealer

Executable exe 261844b03152e938733e6cabfe09e1cc3eca03c905a9e4509c2239291b7306f9

(this sample)

  
Delivery method
Distributed via web download

Comments