MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3c974b9f0a714df2773f11095f9d1c348c3db7676671346baf6e328d7b42bd1a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LummaStealer


Vendor detections: 15


Intelligence 15 IOCs YARA 7 File information Comments

SHA256 hash: 3c974b9f0a714df2773f11095f9d1c348c3db7676671346baf6e328d7b42bd1a
SHA3-384 hash: 4b1ab174d514481eb6e5637cb5d972273efa28dfaff5e655771b6eb3151b2d7fbbcdffece555b21ef514959f996c45cc
SHA1 hash: 7a80a437a3adbd657183613900716f273a6e045d
MD5 hash: 06718ccfd979264c292c63d5803b57a1
humanhash: robin-robert-cold-timing
File name:06718ccfd979264c292c63d5803b57a1.exe
Download: download sample
Signature LummaStealer
File size:266'528 bytes
First seen:2023-12-10 23:10:21 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 639f228f86f07b457c581d62d46d7685 (5 x PrivateLoader, 4 x RiseProStealer, 3 x RedLineStealer)
ssdeep 3072:NWnpVFrrYIEX6Py1BikhWdwk8tXhMGLcFyeG9ColCw4to6uAg0FujVhOUwApdux+:NUVZI+6iUnJCGLcU8olNAOO+pl
TLSH T14F448C12B6D18472D463353209E4DBB55A3EB920CB629DEF77A40F7D4F703D08A319AA
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter abuse_ch
Tags:exe LummaStealer


Avatar
abuse_ch
LummaStealer C2:
http://castlesideopwas.pw/api

Intelligence


File Origin
# of uploads :
1
# of downloads :
303
Origin country :
NL NL
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Launching a process
Sending a custom TCP request
Сreating synchronization primitives
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Creating a file in the %temp% directory
Creating a process from a recently created file
Unauthorized injection to a system process
Enabling autorun by creating a file
Sending an HTTP POST request to an infection source
Sending an HTTP GET request to an infection source
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
control lolbin mokes overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Glupteba, LummaC Stealer, Petite Virus,
Detection:
malicious
Classification:
troj.adwa.spyw.expl.evad.mine
Score:
100 / 100
Signature
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found Tor onion address
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the hosts file
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses process hollowing technique
Sigma detected: Schedule binary from dotnet directory
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
UAC bypass detected (Fodhelper)
Uses ping.exe to check the status of other devices and networks
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected Glupteba
Yara detected LummaC Stealer
Yara detected Petite Virus
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1357911 Sample: supPDztYbI.exe Startdate: 11/12/2023 Architecture: WINDOWS Score: 100 136 reviveincapablewew.pw 2->136 138 ratefacilityframw.fun 2->138 140 9 other IPs or domains 2->140 164 Multi AV Scanner detection for domain / URL 2->164 166 Found malware configuration 2->166 168 Malicious sample detected (through community Yara rule) 2->168 170 17 other signatures 2->170 15 supPDztYbI.exe 2->15         started        18 sresaic 2->18         started        signatures3 process4 signatures5 238 Contains functionality to inject code into remote processes 15->238 240 Writes to foreign memory regions 15->240 242 Allocates memory in foreign processes 15->242 244 Injects a PE file into a foreign processes 15->244 20 AppLaunch.exe 15->20         started        process6 signatures7 172 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 20->172 174 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 20->174 176 Maps a DLL or memory area into another process 20->176 178 2 other signatures 20->178 23 explorer.exe 13 16 20->23 injected process8 dnsIp9 146 185.172.128.19, 49718, 80 NADYMSS-ASRU Russian Federation 23->146 148 81.19.131.34, 49717, 80 IVC-ASRU Russian Federation 23->148 150 host-host-file8.com 212.193.52.24 ASBAXETNRU Russian Federation 23->150 106 C:\Users\user\AppData\Roaming\svesaic, PE32 23->106 dropped 108 C:\Users\user\AppData\Local\Temp\FF7A.exe, PE32 23->108 dropped 110 C:\Users\user\AppData\Local\Temp\72CA.exe, PE32 23->110 dropped 112 5 other files (4 malicious) 23->112 dropped 180 System process connects to network (likely due to code injection or exploit) 23->180 182 Benign windows process drops PE files 23->182 184 Adds a directory exclusion to Windows Defender 23->184 186 Hides that the sample has been downloaded from the Internet (zone.identifier) 23->186 28 36E6.exe 7 23->28         started        32 72CA.exe 23->32         started        34 42DE.exe 23->34         started        36 4 other processes 23->36 file10 signatures11 process12 dnsIp13 114 C:\Users\user\AppData\Local\Temp\tuc3.exe, PE32 28->114 dropped 116 C:\Users\user\AppData\Local\...\toolspub2.exe, PE32 28->116 dropped 118 C:\Users\user\AppData\Local\...\latestX.exe, PE32+ 28->118 dropped 126 2 other malicious files 28->126 dropped 210 Multi AV Scanner detection for dropped file 28->210 39 tuc3.exe 28->39         started        42 toolspub2.exe 28->42         started        45 31839b57a4f11171d6abc8bbc4451ee4.exe 28->45         started        56 4 other processes 28->56 120 C:\Users\user\AppData\Roaming\...\File2.exe, PE32 32->120 dropped 122 C:\Users\user\AppData\Roaming\...\File1.exe, PE32 32->122 dropped 47 File1.exe 32->47         started        50 File2.exe 32->50         started        52 conhost.exe 32->52         started        212 Writes to foreign memory regions 34->212 214 Allocates memory in foreign processes 34->214 216 Injects a PE file into a foreign processes 34->216 54 AppLaunch.exe 34->54         started        142 176.123.7.190 ALEXHOSTMD Moldova Republic of 36->142 144 77.105.132.87 PLUSTELECOM-ASRU Russian Federation 36->144 124 C:\Users\user\AppData\...\Protect544cd51a.dll, PE32 36->124 dropped 218 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 36->218 220 Found many strings related to Crypto-Wallets (likely being stolen) 36->220 222 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 36->222 224 Sample uses process hollowing technique 36->224 58 2 other processes 36->58 file14 signatures15 process16 dnsIp17 96 C:\Users\user\AppData\Local\Temp\...\tuc3.tmp, PE32 39->96 dropped 60 tuc3.tmp 39->60         started        188 Detected unpacking (changes PE section rights) 42->188 190 Injects a PE file into a foreign processes 42->190 62 toolspub2.exe 42->62         started        192 Multi AV Scanner detection for dropped file 45->192 194 Detected unpacking (overwrites its own PE header) 45->194 196 UAC bypass detected (Fodhelper) 45->196 208 2 other signatures 45->208 154 176.123.10.211 ALEXHOSTMD Moldova Republic of 47->154 198 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 47->198 200 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 47->200 202 Tries to harvest and steal browser information (history, passwords, etc) 47->202 98 C:\Users\user\AppData\Local\...\AppLaunch.exe, PE32 54->98 dropped 65 cmd.exe 54->65         started        100 C:\Users\user\AppData\Local\Temp\Broom.exe, PE32 56->100 dropped 102 C:\Program Filesbehaviorgraphoogle\Chrome\updater.exe, PE32+ 56->102 dropped 104 C:\Windows\System32\drivers\etc\hosts, ASCII 56->104 dropped 204 Modifies the hosts file 56->204 206 Adds a directory exclusion to Windows Defender 56->206 67 Broom.exe 56->67         started        156 ratefacilityframw.fun 104.21.74.182 CLOUDFLARENETUS United States 58->156 158 dayfarrichjwclik.fun 104.21.80.57 CLOUDFLARENETUS United States 58->158 160 3 other IPs or domains 58->160 file18 signatures19 process20 signatures21 69 tuc3.exe 60->69         started        226 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 62->226 228 Maps a DLL or memory area into another process 62->228 230 Checks if the current machine is a virtual machine (disk enumeration) 62->230 232 Creates a thread in another existing process (thread injection) 62->232 234 Uses ping.exe to check the status of other devices and networks 65->234 72 PING.EXE 65->72         started        75 conhost.exe 65->75         started        77 chcp.com 65->77         started        236 Multi AV Scanner detection for dropped file 67->236 process22 dnsIp23 94 C:\Users\user\AppData\Local\Temp\...\tuc3.tmp, PE32 69->94 dropped 79 tuc3.tmp 69->79         started        152 127.0.0.1 unknown unknown 72->152 file24 process25 file26 128 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 79->128 dropped 130 C:\Users\user\AppData\Local\...\_isdecmp.dll, PE32 79->130 dropped 132 C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32 79->132 dropped 134 56 other files (4 malicious) 79->134 dropped 162 Uses schtasks.exe or at.exe to add and modify task schedules 79->162 83 xrecode3.exe 79->83         started        86 schtasks.exe 79->86         started        88 net.exe 79->88         started        signatures27 process28 file29 92 C:\ProgramData\...\SpaceRacesEX.exe, PE32 83->92 dropped 90 conhost.exe 86->90         started        process30
Threat name:
Win32.Trojan.SmokeLoader
Status:
Malicious
First seen:
2023-12-08 16:07:33 UTC
File Type:
PE (Exe)
AV detection:
16 of 23 (69.57%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:eternity family:redline family:smokeloader botnet:@oleh_ps botnet:livetraffic botnet:up3 backdoor infostealer trojan
Behaviour
Checks SCSI registry key(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Program crash
Suspicious use of SetThreadContext
Executes dropped EXE
Downloads MZ/PE file
Eternity
RedLine
RedLine payload
SmokeLoader
Malware Config
C2 Extraction:
http://81.19.131.34/fks/index.php
77.105.132.87:6731
176.123.7.190:32927
Malware family:
SmokeLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:NET
Author:malware-lu
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:pe_no_import_table
Description:Detect pe file that no import table
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments