MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 40261840439d099ebe46d51a276a5d503c2ac99c2adce42bf06c38da4255ca06. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
LummaStealer
Vendor detections: 18
| SHA256 hash: | 40261840439d099ebe46d51a276a5d503c2ac99c2adce42bf06c38da4255ca06 |
|---|---|
| SHA3-384 hash: | f212bffc5aedc8f168ce42da3b31db95935769b3ddc7d1387524a8c85feae52c44a30feb849c7cad1259508dc27b22ab |
| SHA1 hash: | 0b7dcc656908f98f97886aeef4ab64a37fffd230 |
| MD5 hash: | f155a7880ed2f82ac880a811a0798239 |
| humanhash: | lemon-lemon-lion-orange |
| File name: | f155a7880ed2f82ac880a811a0798239.exe |
| Download: | download sample |
| Signature | LummaStealer |
| File size: | 309'760 bytes |
| First seen: | 2023-12-19 21:05:18 UTC |
| Last seen: | 2023-12-19 22:18:19 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 2f42c7240ce091676db27467fe8eb2d6 (2 x LummaStealer, 1 x Socks5Systemz, 1 x RedLineStealer) |
| ssdeep | 3072:bcPkyGUHKmKoj+J2cicTmse6xOkhuB/B+6Xl8tHy0aajAs3fSjrD9cBa7cKlO/Cl:o7BKKj3voOGuBZ+6Xl8tZaVKfcHyk7G |
| TLSH | T1E7649E2292E0E471D56346728E29C6EC2A3EF8E14F553A8F1798193F1F765E2C27231D |
| TrID | 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 15.9% (.EXE) Win64 Executable (generic) (10523/12/4) 9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 6.8% (.EXE) Win32 Executable (generic) (4505/5/1) |
| File icon (PE): | |
| dhash icon | e0ac94a4a4a4b0b2 (1 x Stealc, 1 x LummaStealer) |
| Reporter | |
| Tags: | exe LummaStealer |
Intelligence
File Origin
# of uploads :
2
# of downloads :
335
Origin country :
NLVendor Threat Intelligence
Malware family:
smoke
ID:
1
File name:
f155a7880ed2f82ac880a811a0798239.exe
Verdict:
Malicious activity
Analysis date:
2023-12-19 21:06:36 UTC
Tags:
loader smoke smokeloader
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
SmokeLoader
Result
Verdict:
Malware
Maliciousness:
Behaviour
Searching for the window
Сreating synchronization primitives
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
DNS request
Sending an HTTP GET request
Query of malicious DNS domain
Sending a TCP request to an infection source
Unauthorized injection to a system process
Enabling autorun by creating a file
Sending an HTTP POST request to an infection source
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
packed
Verdict:
Malicious
Labled as:
Malware
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Malicious
Result
Threat name:
SmokeLoader
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Detected unpacking (changes PE section rights)
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected SmokeLoader
Behaviour
Behavior Graph:
Score:
100%
Verdict:
Malware
File Type:
PE
Detection:
smokeloader
Threat name:
Win32.Trojan.Generic
Status:
Malicious
First seen:
2023-12-19 21:06:05 UTC
File Type:
PE (Exe)
Extracted files:
34
AV detection:
17 of 37 (45.95%)
Threat level:
2/5
Detection(s):
Malicious file
Verdict:
malicious
Result
Malware family:
smokeloader
Score:
10/10
Tags:
family:smokeloader botnet:pub1 backdoor trojan
Behaviour
Checks SCSI registry key(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Uses Task Scheduler COM API
Deletes itself
SmokeLoader
Malware Config
C2 Extraction:
http://humydrole.com/tmp/index.php
http://trunk-co.ru/tmp/index.php
http://weareelight.com/tmp/index.php
http://pirateking.online/tmp/index.php
http://piratia.pw/tmp/index.php
http://go-piratia.ru/tmp/index.php
http://trunk-co.ru/tmp/index.php
http://weareelight.com/tmp/index.php
http://pirateking.online/tmp/index.php
http://piratia.pw/tmp/index.php
http://go-piratia.ru/tmp/index.php
Unpacked files
SH256 hash:
a1e98eaa5d764ee7102955bdabbd99ee429c71d3c743345e8dd2ab9f4b004454
MD5 hash:
a73bdfe08696644a871d7f5907a183e5
SHA1 hash:
3c7dcc717a1c09ffc6bfa6fc62a03436c43ffeac
Detections:
SmokeLoaderStage2
win_smokeloader_a2
Parent samples :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 hash:
40261840439d099ebe46d51a276a5d503c2ac99c2adce42bf06c38da4255ca06
MD5 hash:
f155a7880ed2f82ac880a811a0798239
SHA1 hash:
0b7dcc656908f98f97886aeef4ab64a37fffd230
Malware family:
SmokeLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.