MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2806b7e515048d1a620b70f50e2a638ffa4ef35502405e2c02e5098d71da65b6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LummaStealer


Vendor detections: 9


Intelligence 9 IOCs YARA 3 File information Comments

SHA256 hash: 2806b7e515048d1a620b70f50e2a638ffa4ef35502405e2c02e5098d71da65b6
SHA3-384 hash: aa3908582e2880e2935223f6caeaad96d359cdde27076a4fb282f60d849fb547c00d445c4bcc140fab688c45ce7e9531
SHA1 hash: 2802f9140dd6263b18ab9ea25629cd85ea154176
MD5 hash: cc2c231cac4c1b4026dad5a8e2aa619d
humanhash: wyoming-ceiling-carpet-bulldog
File name:but3.ps1
Download: download sample
Signature LummaStealer
File size:1'944 bytes
First seen:2024-11-10 08:14:57 UTC
Last seen:2024-11-14 11:15:51 UTC
File type:PowerShell (PS) ps1
MIME type:text/plain
ssdeep 48:Isy1P3TZLpoWaFY4c/1M4+yR0L4mMJPXDFrDuNywLdcyybrX:OPd42
Threatray 8 similar samples on MalwareBazaar
TLSH T1D3412459B38CD82487C452154D1EB444F26A466E213375F462CDF560ECB51FC7A7A218
Magika powershell
Reporter JAMESWT_WT
Tags:LummaStealer notion-ramchhaya-com ps1 repostebhu-sbs

Intelligence


File Origin
# of uploads :
2
# of downloads :
97
Origin country :
IT IT
Vendor Threat Intelligence
Verdict:
Malicious
Score:
99.9%
Tags:
ransomware dropper virus
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
persistence
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
AI detected suspicious sample
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found suspicious powershell code related to unpacking or dynamic code loading
Loading BitLocker PowerShell Module
LummaC encrypted strings found
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Powershell drops PE file
Powershell uses Background Intelligent Transfer Service (BITS)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Suricata IDS alerts for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Yara detected LummaC Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1553045 Sample: but3.ps1 Startdate: 10/11/2024 Architecture: WINDOWS Score: 100 26 zanymarkedjz.fun 2->26 28 repostebhu.sbs 2->28 30 sufusioticarchi.b-cdn.net 2->30 38 Suricata IDS alerts for network traffic 2->38 40 Found malware configuration 2->40 42 Malicious sample detected (through community Yara rule) 2->42 44 7 other signatures 2->44 7 powershell.exe 1 38 2->7         started        11 sftpc.exe 2->11         started        13 sftpc.exe 2->13         started        15 svchost.exe 1 1 2->15         started        signatures3 process4 dnsIp5 24 C:\Users\user\AppData\Roaming\...\sftpc.exe, PE32 7->24 dropped 52 Found many strings related to Crypto-Wallets (likely being stolen) 7->52 54 Powershell uses Background Intelligent Transfer Service (BITS) 7->54 56 Found suspicious powershell code related to unpacking or dynamic code loading 7->56 66 2 other signatures 7->66 18 sftpc.exe 7->18         started        22 conhost.exe 7->22         started        58 Query firmware table information (likely to detect VMs) 11->58 60 Tries to harvest and steal ftp login credentials 11->60 62 Tries to harvest and steal browser information (history, passwords, etc) 11->62 64 Tries to steal Crypto Currency Wallets 13->64 34 sufusioticarchi.b-cdn.net 169.150.247.37, 443, 49733, 49734 SPIRITTEL-ASUS United States 15->34 36 127.0.0.1 unknown unknown 15->36 file6 signatures7 process8 dnsIp9 32 repostebhu.sbs 104.21.14.17, 443, 49741, 49742 CLOUDFLARENETUS United States 18->32 46 Query firmware table information (likely to detect VMs) 18->46 48 Found many strings related to Crypto-Wallets (likely being stolen) 18->48 50 Tries to steal Crypto Currency Wallets 18->50 signatures10
Threat name:
Script-PowerShell.Trojan.Powdow
Status:
Malicious
First seen:
2024-11-09 23:02:12 UTC
File Type:
Text (PowerShell)
AV detection:
7 of 38 (18.42%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
discovery execution persistence
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: PowerShell
System Location Discovery: System Language Discovery
Adds Run key to start application
Executes dropped EXE
Malware Config
Dropper Extraction:
https://sufusioticArchi.b-cdn.net/narubu.zip
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:detect_powershell
Author:daniyyell
Description:Detects suspicious PowerShell activity related to malware execution
Rule name:Detect_PowerShell_Obfuscation
Author:daniyyell
Description:Detects obfuscated PowerShell commands commonly used in malicious scripts.
Rule name:SUSP_PowerShell_Base64_Decode
Author:SECUINFRA Falcon Team
Description:Detects PowerShell code to decode Base64 data. This can yield many FP

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments