MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 379008f3cf6b96277d0b545dd967dc969d7ef02534afd4a68a4488a805126d13. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
LummaStealer
Vendor detections: 14
| SHA256 hash: | 379008f3cf6b96277d0b545dd967dc969d7ef02534afd4a68a4488a805126d13 |
|---|---|
| SHA3-384 hash: | 3283c8e53bcd18846626c93efe3ebb003e91b6a824274dd3d4342a97c7adb405f84ab277ba65e2694f2634bd8720d9ef |
| SHA1 hash: | f8f9c3fbc9b45b26bb8ed11bd623995a88644d10 |
| MD5 hash: | af012e8e2d7901ecc651c1a3fe3e2e74 |
| humanhash: | floor-minnesota-three-may |
| File name: | af012e8e2d7901ecc651c1a3fe3e2e74.exe |
| Download: | download sample |
| Signature | LummaStealer |
| File size: | 1'794'848 bytes |
| First seen: | 2023-11-26 16:20:07 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | c7fb2b0f7d1b9bb69de473555ebdc92c (6 x RedLineStealer, 3 x LummaStealer) |
| ssdeep | 24576:3HMBMJIR6FC97GkbnwqjWr7eyh6a9DhvhoyhX:3HMB0FC97GkbnwwWV6a3vLhX |
| TLSH | T142851B1132F95B59F9F39BB956BAA611083AFC69CF11C2DF126094AE0D21BD08970F37 |
| TrID | 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 15.9% (.EXE) Win64 Executable (generic) (10523/12/4) 9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 6.8% (.EXE) Win32 Executable (generic) (4505/5/1) |
| Reporter | |
| Tags: | exe LummaStealer |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
194.169.175.235:42691
http://host-file-host6.com/
http://host-host-file8.com/
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DebuggerException__SetConsoleCtrl |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | maldoc_find_kernel32_base_method_1 |
|---|---|
| Author: | Didier Stevens (https://DidierStevens.com) |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | PE_Digital_Certificate |
|---|---|
| Author: | albertzsigovits |
| Rule name: | pe_no_import_table |
|---|---|
| Description: | Detect pe file that no import table |
| Rule name: | PE_Potentially_Signed_Digital_Certificate |
|---|---|
| Author: | albertzsigovits |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.