MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 44142a900cb0797503a6d5849aa1b35af054a9509a8fd282f56bb160e0eb842e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LummaStealer


Vendor detections: 16


Intelligence 16 IOCs YARA 3 File information Comments

SHA256 hash: 44142a900cb0797503a6d5849aa1b35af054a9509a8fd282f56bb160e0eb842e
SHA3-384 hash: dd7f0de8ccb77f7fb1d72698a261abf4f4f9096217d0ce4a65f24b05e663049cfb62f2f315be2ded0288b61650adbde1
SHA1 hash: 68c343e73199f10493e6f1d9e8a710654759fbab
MD5 hash: 5d5d7b4b1c531729aab5b54079036a1a
humanhash: harry-chicken-blue-video
File name:5d5d7b4b1c531729aab5b54079036a1a.exe
Download: download sample
Signature LummaStealer
File size:3'813'407 bytes
First seen:2024-09-25 07:05:34 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
ssdeep 49152:o2BhWrtxvkmVk88+RZFOrCb/w8dRsp/1KfVFy7icWKNjFZSoLf:oCo4H+0cK1KfVh7KNjF0kf
TLSH T1070633413A371D67FD626930CAD2B4F51AFD8E4336F0086FDF9A5E06685153E26A2238
TrID 44.4% (.EXE) Win64 Executable (generic) (10523/12/4)
21.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
8.7% (.ICL) Windows Icons Library (generic) (2059/9)
8.5% (.EXE) OS/2 Executable (generic) (2029/13)
8.4% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
Reporter abuse_ch
Tags:exe LummaStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
378
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
http://147.45.44.104/yuop/66f0297e9c3eb_15.exe
Verdict:
Malicious activity
Analysis date:
2024-09-24 17:54:08 UTC
Tags:
netreactor evasion privateloader opendir loader vidar stealer berbew

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
95.7%
Tags:
Discovery Encryption Infostealer Network Stealth Trojan Exploit Trojan Tori
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
overlay vbnet
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
LummaC, Socks5Systemz
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
AI detected suspicious sample
Allocates memory in foreign processes
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to infect the boot sector
Contains functionality to inject code into remote processes
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Drops PE files to the document folder of the user
Found API chain indicative of debugger detection
Found malware configuration
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies Windows Defender protection settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Sample uses process hollowing technique
Sample uses string decryption to hide its real strings
Suricata IDS alerts for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Uses cmd line tools excessively to alter registry or file data
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected LummaC Stealer
Yara detected Socks5Systemz
Yara detected UAC Bypass using CMSTP
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1517953 Sample: CSBls4grBI.exe Startdate: 25/09/2024 Architecture: WINDOWS Score: 100 137 api3.check-data.xyz 2->137 139 roaddrermncomplai.shop 2->139 141 14 other IPs or domains 2->141 159 Suricata IDS alerts for network traffic 2->159 161 Found malware configuration 2->161 163 Malicious sample detected (through community Yara rule) 2->163 167 21 other signatures 2->167 14 CSBls4grBI.exe 2 2->14         started        17 svchost.exe 12 80 2->17         started        19 cmd.exe 2->19         started        21 reg.exe 2->21         started        signatures3 165 Performs DNS queries to domains with low reputation 137->165 process4 signatures5 199 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 14->199 201 Writes to foreign memory regions 14->201 203 Allocates memory in foreign processes 14->203 209 2 other signatures 14->209 23 wmplayer.exe 24 14->23         started        28 WerFault.exe 19 16 14->28         started        30 calc.exe 14->30         started        38 4 other processes 14->38 205 Modifies Windows Defender protection settings 17->205 32 WerFault.exe 17->32         started        34 WerFault.exe 2 17->34         started        36 WerFault.exe 17->36         started        40 4 other processes 17->40 207 Uses cmd line tools excessively to alter registry or file data 19->207 process6 dnsIp7 145 api64.ipify.org 173.231.16.77, 443, 49731 WEBNXUS United States 23->145 147 176.113.115.95, 49744, 80 SELECTELRU Russian Federation 23->147 149 7 other IPs or domains 23->149 103 C:\Users\...\s6DFFufYMzJrqo3FimElX5fj.exe, PE32 23->103 dropped 105 C:\Users\...\roQFL_6P8oBrST60qtW6t8_p.exe, PE32 23->105 dropped 107 C:\Users\...\qgXRN1d8ybkL5u8mnVNy3968.exe, PE32 23->107 dropped 111 7 other malicious files 23->111 dropped 175 Tries to harvest and steal browser information (history, passwords, etc) 23->175 42 s6DFFufYMzJrqo3FimElX5fj.exe 7 23->42         started        46 5WWVLLJfEXknDjKICveSdQiy.exe 23->46         started        48 qgXRN1d8ybkL5u8mnVNy3968.exe 2 23->48         started        56 2 other processes 23->56 109 C:\ProgramData\Microsoft\...\Report.wer, Unicode 28->109 dropped 50 WerFault.exe 28->50         started        52 WerFault.exe 28->52         started        54 WerFault.exe 28->54         started        58 2 other processes 28->58 177 Modifies Windows Defender protection settings 32->177 file8 signatures9 process10 file11 113 C:\Users\user\AppData\Local\...\Install.exe, PE32 42->113 dropped 179 Multi AV Scanner detection for dropped file 42->179 60 Install.exe 42->60         started        115 C:\Users\...\5WWVLLJfEXknDjKICveSdQiy.tmp, PE32 46->115 dropped 64 5WWVLLJfEXknDjKICveSdQiy.tmp 46->64         started        181 Contains functionality to inject code into remote processes 48->181 183 Writes to foreign memory regions 48->183 185 Allocates memory in foreign processes 48->185 187 LummaC encrypted strings found 48->187 66 RegAsm.exe 48->66         started        69 conhost.exe 48->69         started        117 C:\Users\user\AppData\Local\...\Y-Cleaner.exe, PE32 56->117 dropped 119 C:\Users\user\...\Bunifu_UI_v1.5.3.dll, PE32 56->119 dropped 121 C:\Users\user\AppData\Local\...\dll[1], PE32 56->121 dropped 123 C:\Users\user\AppData\Local\...\soft[1], PE32 56->123 dropped 189 Detected unpacking (changes PE section rights) 56->189 191 Detected unpacking (overwrites its own PE header) 56->191 193 Injects a PE file into a foreign processes 56->193 signatures12 process13 dnsIp14 127 C:\Users\user\AppData\Local\...\Install.exe, PE32 60->127 dropped 197 Multi AV Scanner detection for dropped file 60->197 71 Install.exe 60->71         started        129 C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32 64->129 dropped 131 C:\Users\user\AppData\...\unins000.exe (copy), PE32 64->131 dropped 133 C:\Users\user\AppData\Local\...\is-II5AE.tmp, PE32 64->133 dropped 135 15 other files (7 malicious) 64->135 dropped 74 cleonavideoeditor.exe 64->74         started        143 roaddrermncomplai.shop 104.21.32.236 CLOUDFLARENETUS United States 66->143 78 WerFault.exe 66->78         started        file15 signatures16 process17 dnsIp18 171 Multi AV Scanner detection for dropped file 71->171 173 Modifies Windows Defender protection settings 71->173 80 cmd.exe 71->80         started        151 eredire.ua 185.208.158.248 SIMPLECARRER2IT Switzerland 74->151 153 195.154.173.35 OnlineSASFR France 74->153 125 C:\...AP Game Console 9.25.47.exe, PE32 74->125 dropped file19 signatures20 process21 signatures22 155 Uses cmd line tools excessively to alter registry or file data 80->155 157 Modifies Windows Defender protection settings 80->157 83 forfiles.exe 80->83         started        86 forfiles.exe 80->86         started        88 forfiles.exe 80->88         started        90 2 other processes 80->90 process23 signatures24 169 Modifies Windows Defender protection settings 83->169 92 cmd.exe 83->92         started        95 cmd.exe 86->95         started        97 cmd.exe 88->97         started        process25 signatures26 195 Uses cmd line tools excessively to alter registry or file data 92->195 99 reg.exe 92->99         started        101 reg.exe 95->101         started        process27
Threat name:
Win64.Trojan.Privateloader
Status:
Malicious
First seen:
2024-09-24 18:28:21 UTC
AV detection:
19 of 24 (79.17%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
gcleaner socks5systemz lummastealer risepro
Result
Malware family:
n/a
Score:
  6/10
Tags:
discovery
Behaviour
Runs regedit.exe
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Looks up external IP address via web service
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
44142a900cb0797503a6d5849aa1b35af054a9509a8fd282f56bb160e0eb842e
MD5 hash:
5d5d7b4b1c531729aab5b54079036a1a
SHA1 hash:
68c343e73199f10493e6f1d9e8a710654759fbab
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:pe_no_import_table
Description:Detect pe file that no import table

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

LummaStealer

Executable exe 44142a900cb0797503a6d5849aa1b35af054a9509a8fd282f56bb160e0eb842e

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (GUARD_CF)high

Comments