MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4567eee3f0b37c6ce2e213d54820f1fcc2093f97743354bff6f98c57456c182f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LummaStealer


Vendor detections: 16


Intelligence 16 IOCs YARA 6 File information Comments

SHA256 hash: 4567eee3f0b37c6ce2e213d54820f1fcc2093f97743354bff6f98c57456c182f
SHA3-384 hash: e273c25b12f85139fb517b81367c9ebaae2231b1bc1a50ed632bee614de495220409f2c011b50a1ba6ab0077973f5205
SHA1 hash: 92e3175b769257cb551f443aa0c9f59cc731460c
MD5 hash: 9e289cbc351919484c3cd52c4bd31181
humanhash: london-oklahoma-south-skylark
File name:9e289cbc351919484c3cd52c4bd31181.exe
Download: download sample
Signature LummaStealer
File size:1'263'104 bytes
First seen:2023-11-14 11:30:09 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader)
ssdeep 24576:kyBxzWrlqvpsAJI52s5Buf9k3qzTuCCbfKyYEjqX8XtvK:zBxSrljA3sPAEqzTuCsXjM8X
Threatray 2'598 similar samples on MalwareBazaar
TLSH T11B452343BAD95133C8352FB42CFF06831C363D52A578E7772A46682E1C219D59A32B7B
TrID 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60)
11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
3.7% (.EXE) Win64 Executable (generic) (10523/12/4)
2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
File icon (PE):PE icon
dhash icon f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader)
Reporter abuse_ch
Tags:exe LummaStealer


Avatar
abuse_ch
LummaStealer C2:
http://herioteeakl.pw/api

Intelligence


File Origin
# of uploads :
1
# of downloads :
327
Origin country :
NL NL
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Sending a custom TCP request
Gathering data
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
advpack anti-vm CAB control explorer greyware installer lolbin lolbin packed rundll32 setupapi sfx shell32 zusy
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine Stealer
Verdict:
Malicious
Result
Threat name:
Mystic Stealer, RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Contains functionality to inject code into remote processes
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Writes to foreign memory regions
Yara detected Mystic Stealer
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1342268 Sample: SYZ78rG7gP.exe Startdate: 14/11/2023 Architecture: WINDOWS Score: 100 66 Snort IDS alert for network traffic 2->66 68 Multi AV Scanner detection for domain / URL 2->68 70 Found malware configuration 2->70 72 14 other signatures 2->72 10 SYZ78rG7gP.exe 1 4 2->10         started        13 rundll32.exe 2->13         started        15 rundll32.exe 2->15         started        17 2 other processes 2->17 process3 file4 54 C:\Users\user\AppData\Local\...\Rq5ln65.exe, PE32 10->54 dropped 56 C:\Users\user\AppData\Local\...\6mL0br2.exe, PE32 10->56 dropped 19 Rq5ln65.exe 1 4 10->19         started        process5 file6 46 C:\Users\user\AppData\Local\...\Za3sy90.exe, PE32 19->46 dropped 48 C:\Users\user\AppData\Local\...\5tI9Fm1.exe, PE32 19->48 dropped 74 Antivirus detection for dropped file 19->74 76 Multi AV Scanner detection for dropped file 19->76 78 Machine Learning detection for dropped file 19->78 23 Za3sy90.exe 1 4 19->23         started        signatures7 process8 file9 50 C:\Users\user\AppData\Local\...\SE2HS20.exe, PE32 23->50 dropped 52 C:\Users\user\AppData\Local\...\4cd539Iq.exe, PE32 23->52 dropped 86 Multi AV Scanner detection for dropped file 23->86 88 Machine Learning detection for dropped file 23->88 27 SE2HS20.exe 1 4 23->27         started        signatures10 process11 file12 58 C:\Users\user\AppData\Local\...\3Hp10QX.exe, PE32 27->58 dropped 60 C:\Users\user\AppData\Local\...\2iK5133.exe, PE32 27->60 dropped 90 Multi AV Scanner detection for dropped file 27->90 92 Machine Learning detection for dropped file 27->92 31 2iK5133.exe 1 27->31         started        34 3Hp10QX.exe 1 27->34         started        signatures13 process14 signatures15 94 Multi AV Scanner detection for dropped file 31->94 96 Machine Learning detection for dropped file 31->96 98 Contains functionality to inject code into remote processes 31->98 36 AppLaunch.exe 8 4 31->36         started        40 conhost.exe 31->40         started        100 Writes to foreign memory regions 34->100 102 Allocates memory in foreign processes 34->102 104 Injects a PE file into a foreign processes 34->104 42 AppLaunch.exe 12 34->42         started        44 conhost.exe 34->44         started        process16 dnsIp17 62 5.42.92.51, 19057, 49704 RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU Russian Federation 36->62 80 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 36->80 82 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 36->82 84 Tries to harvest and steal browser information (history, passwords, etc) 36->84 64 5.42.92.43, 49711, 80 RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU Russian Federation 42->64 signatures18
Threat name:
Win32.Trojan.Stealerc
Status:
Malicious
First seen:
2023-11-14 10:23:16 UTC
File Type:
PE (Exe)
Extracted files:
149
AV detection:
20 of 38 (52.63%)
Threat level:
  5/5
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:glupteba family:mystic family:raccoon family:redline family:sectoprat family:smokeloader botnet:c78f27a0d43f29dbd112dbd9e387406b botnet:pixelfresh botnet:taiga botnet:up3 backdoor discovery dropper evasion infostealer loader persistence rat spyware stealer trojan upx
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Enumerates physical storage devices
Program crash
Checks for VirtualBox DLLs, possible anti-VM trick
Drops file in Windows directory
Launches sc.exe
Drops file in System32 directory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
.NET Reactor proctector
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
UPX packed file
Windows security modification
Downloads MZ/PE file
Modifies Windows Firewall
Detect Mystic stealer payload
Glupteba
Glupteba payload
Modifies Windows Defender Real-time Protection settings
Mystic
Raccoon
Raccoon Stealer payload
RedLine
RedLine payload
SectopRAT
SectopRAT payload
SmokeLoader
Malware Config
C2 Extraction:
5.42.92.51:19057
http://5.42.92.190/fks/index.php
194.49.94.11:80
http://host-file-host6.com/
http://host-host-file8.com/
http://31.192.237.23:80/
http://193.233.132.12:80/
Unpacked files
SH256 hash:
e2823241477a32fc9f36ff27a429f47b4a7ef1b1999a6e80db4d279b5b73231c
MD5 hash:
1780b1230d94c0234b70a810628ce1d9
SHA1 hash:
c8a4ce386e8e062f2d3ac35c68769cb24ee601e6
Detections:
redline
Parent samples :
3e5d50f9256e94ff3a0e33bd30c01998a5cf299daf96808747729fb72650eab1
6e627ca700a4794c9e46a849daed709312bacf1587109607e2f6c5eebb8a2598
fdad89fe9db1c6caa09660a2abd2a99e73a8f442dec417ff49b22614057c74ca
4d201919a0ebca66c9444a66f9324fb870e4af25252f27aa405255cca0167379
114e74be49ed1e1bc90c85a74aaf60fbc8d766d0e8755c100ffab51a43d71404
a3cc4fff4aac80dd379ae09712229eff389c1172d888180dbce61715965f4885
4567eee3f0b37c6ce2e213d54820f1fcc2093f97743354bff6f98c57456c182f
c9c5798e7a3d4bd33f48a62c21591a50d890d25d509aa359798720ea4ba3fb14
371178f2c72748b41e33d1862f900e09d955f884f4b59857073c409e61b254ce
1abb8e978cc50ac436946ba779cfc8bdd5022a6251aca2d761b09b5a6433fbee
e69fa17979f4dc03a37fbe37f92d686092271a6d610ae3d31d59d52441dd812a
c3ca3799150177eddce80d6eaf8905f29b02c31651f565a913690b83ba36a788
fe3b975cd1b89dcd4ec203a5c74a6b612a2df2df4f200d40b5bd2efd9ab5d73f
cdd3fc19ff6129cd6a4ce32c48a2eceb0ed91e3f129e6f660bcfcebeac1296bc
7db04ddb55518c98493c17e533c6607d28a10d5385aa236d9a84a10670c49574
90c9d40878861fb8a41fe65b46aab0a2a7153866619beb2efa2be92d71ffd240
f7c6af19e272f9017f27afa2699e68759a231edfcb1386f854121257d405e167
6965c5ea91cea03b9a1204a762277a3ee3f4f89f02f2fea0599b6db6ea49e6f0
743754530bf3cdcf57d1f00030b109ffce1431d59d3bb0db3af2c45a57523928
0bbc5d27d984dd680feb23e3aeae57f7139953d3efb11926b65952b5f664cf10
195256a242e1a4f2a1833194d97951ebb74ac0091b0cd6be50a3e2f01691b421
16a1c64a64c741f354cfa13e4640e2c10917a6968dc0ac075d0c3c13270a87cf
b3b3761301129116546060fdda707826c64c631f45c7af948a809fc4e81cd87c
1809dddc2ed1656288e8932cf69022e58b688310423dcb7159fc73b38ee5abb0
5f718ca24fcd480d7daad2d100dd55b7491c8704765b1fefc09884b3e1f31ebe
SH256 hash:
7a20119e20090bc86a3239d6a88c28024da7d881bec53a0468dde4cf71337be0
MD5 hash:
73f0f6828696b95c3ba710a51aa91662
SHA1 hash:
35627dfd71d1fac7ff7c4498c155fe1b226cdb13
SH256 hash:
fbbfc1a4203c08116690cb05c0f1d38a19e936bafa0a192759645243dd2d4829
MD5 hash:
2bf368c74361fd8e4e410a5ba07aa7f4
SHA1 hash:
e2c20b65f34de033d5d2c4873d093b673de7638e
Detections:
win_smokeloader_a2
SH256 hash:
77ab8eff06d90f3551d8ed7a496155fa9e1f7d2d73f604aa7697064cb3e608f6
MD5 hash:
ce2f8147a947553689196e8de78c71e2
SHA1 hash:
23a0fc7301ecea39d9a892d32aa2fb230478c807
Detections:
MAL_Malware_Imphash_Mar23_1
SH256 hash:
4567eee3f0b37c6ce2e213d54820f1fcc2093f97743354bff6f98c57456c182f
MD5 hash:
9e289cbc351919484c3cd52c4bd31181
SHA1 hash:
92e3175b769257cb551f443aa0c9f59cc731460c
Detections:
win_redline_wextract_hunting_oct_2023
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:detect_Redline_Stealer
Author:Varp0s
Rule name:INDICATOR_EXE_Packed_ConfuserEx
Author:ditekSHen
Description:Detects executables packed with ConfuserEx Mod
Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:win_redline_wextract_hunting_oct_2023
Author:Matthew @ Embee_Research
Description:Detects wextract archives related to redline/amadey

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

LummaStealer

Executable exe 4567eee3f0b37c6ce2e213d54820f1fcc2093f97743354bff6f98c57456c182f

(this sample)

  
Delivery method
Distributed via web download

Comments