MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 47450287dbb0833027118daa007d1e6fedbd1778480a3089e141692d7d6f8707. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
LummaStealer
Vendor detections: 16
| SHA256 hash: | 47450287dbb0833027118daa007d1e6fedbd1778480a3089e141692d7d6f8707 |
|---|---|
| SHA3-384 hash: | 5e16cb285aae59b0063632d89d1153a6ec1e246f3166d8520a6ba45ab8a86842a0f8179bbeaed1f48373a65c672ad43f |
| SHA1 hash: | 21f19600597defac8b5759058c29b234f9a6e189 |
| MD5 hash: | c2fe59d13e81fc6e275ff9e8e3c51bf4 |
| humanhash: | hotel-butter-shade-lamp |
| File name: | file |
| Download: | download sample |
| Signature | LummaStealer |
| File size: | 894'464 bytes |
| First seen: | 2023-10-18 16:05:53 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader) |
| ssdeep | 24576:byu6xSX69qRidr/IX8NYtongabx5kbGBR8Jv:Oo6oRitIXHEgajk6BR8 |
| Threatray | 2'041 similar samples on MalwareBazaar |
| TLSH | T1F4152312ABDC597BD8B213B004F713D71D34BCB6987C632B2347A84958B2698A43677F |
| TrID | 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60) 11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 3.7% (.EXE) Win64 Executable (generic) (10523/12/4) 2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) |
| File icon (PE): | |
| dhash icon | f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader) |
| Reporter | |
| Tags: | exe LummaStealer |
Intelligence
File Origin
USVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
77.91.124.55:19071
http://77.91.124.1/theme/index.php
85.209.176.128:80
185.216.70.238:37515
https://pastebin.com/raw/8baCJyMF
168.119.126.250:19180
Unpacked files
e9d6ddaf1fb2b2ccffc9da08350fe052821b36211b8822b0e7c413638c1cbbbe
815ba7f94597b7f2c838c7244b2a0494902ee4cc073f375ca4eb3abdc8ed0b3a
47450287dbb0833027118daa007d1e6fedbd1778480a3089e141692d7d6f8707
b8bf36d283278b94e53ba6b660dee1debbcf9f5628ee5b5ab46f789a414b6863
e45b3ee9e98fbf06f2738e3a0d4b584079907274dec7df8b5062799da8487546
45aa4cd8895cde34a9e5088e968f73a2776e28a404cea75b639fe875cb66dcf9
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | detect_Redline_Stealer |
|---|---|
| Author: | Varp0s |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.