MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 47a1bbb47ede2daa62558515a9a4e98410a8b2d7c9e74fe5c45783969c48be39. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
LummaStealer
Vendor detections: 15
| SHA256 hash: | 47a1bbb47ede2daa62558515a9a4e98410a8b2d7c9e74fe5c45783969c48be39 |
|---|---|
| SHA3-384 hash: | 470b1ba8262a802ac8b39d7fc57f1081ecd2fa3b5c85dc73c1e66885a1bc4669eddbaf3048e8440ab76356e2caf29136 |
| SHA1 hash: | d5c7e9b3bc28e876ae223f9a6dd9b4d7f6cda9fd |
| MD5 hash: | 1dfda6fc13c7efab9f6148e7339ab80c |
| humanhash: | solar-sink-happy-stream |
| File name: | orderconfirmation.exe |
| Download: | download sample |
| Signature | LummaStealer |
| File size: | 3'678'161 bytes |
| First seen: | 2024-09-26 14:01:24 UTC |
| Last seen: | 2024-11-21 12:41:37 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | b5a014d7eeb4c2042897567e1288a095 (19 x HijackLoader, 14 x ValleyRAT, 12 x LummaStealer) |
| ssdeep | 49152:+pz3iNJsAL41DAd5HF9rE1CNcwpXwC4wvNys3qPbaNraNZGDniQgWHGXUTuSq:+pCsA8q/HFZEoNBpXoijL5cWmR |
| TLSH | T17406330637C9C5F2C924CA729F17EF994632F36639C44BC726968E465CE32A183437E9 |
| TrID | 38.7% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 24.6% (.EXE) Win64 Executable (generic) (10523/12/4) 11.8% (.EXE) Win16 NE executable (generic) (5038/12/1) 10.5% (.EXE) Win32 Executable (generic) (4504/4/1) 4.7% (.EXE) OS/2 Executable (generic) (2029/13) |
| Magika | pebin |
| File icon (PE): | |
| dhash icon | c292ecd8f2f6fe1c (15 x HijackLoader, 11 x LummaStealer, 7 x Arechclient2) |
| Reporter | Anonymous |
| Tags: | 77-105-161-194 exe LummaStealer |
Intelligence
File Origin
# of uploads :
2
# of downloads :
461
Origin country :
USVendor Threat Intelligence
Malware family:
netsupport
ID:
1
File name:
orderconfirmation.exe
Verdict:
Malicious activity
Analysis date:
2024-09-26 14:02:34 UTC
Tags:
lumma stealer netsupport unwanted remote
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection(s):
Verdict:
Malicious
Score:
93.3%
Tags:
Encryption Trojan Vmdetect Alien
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a window
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file in the %AppData% subdirectories
Launching cmd.exe command interpreter
Launching a process
DNS request
Connection attempt
Sending a custom TCP request
Behavior that indicates a threat
Unauthorized injection to a system process
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
epmicrosoft_visual_cc fingerprint installer lolbin masquerade microsoft_visual_cc overlay packed shell32
Verdict:
Malicious
Labled as:
Trojan.Generic
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Unknown
Result
Threat name:
LummaC
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
AI detected suspicious sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Found malware configuration
Initial sample is a PE file and has a suspicious name
Injects code into the Windows Explorer (explorer.exe)
LummaC encrypted strings found
Maps a DLL or memory area into another process
Sample uses string decryption to hide its real strings
Switches to a custom stack to bypass stack traces
Writes to foreign memory regions
Yara detected LummaC Stealer
Behaviour
Behavior Graph:
Score:
88%
Verdict:
Malware
File Type:
PE
Threat name:
Win32.Spyware.Lummastealer
Status:
Malicious
First seen:
2024-09-26 14:02:06 UTC
File Type:
PE (Exe)
Extracted files:
54
AV detection:
16 of 24 (66.67%)
Threat level:
2/5
Detection(s):
Suspicious file
Result
Malware family:
lumma
Score:
10/10
Tags:
family:lumma discovery stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Lumma Stealer, LummaC
Malware Config
C2 Extraction:
https://reinforcenh.shop/api
https://stogeneratmns.shop/api
https://fragnantbui.shop/api
https://drawzhotdog.shop/api
https://vozmeatillu.shop/api
https://offensivedzvju.shop/api
https://ghostreedmnu.shop/api
https://gutterydhowi.shop/api
https://teenylogicod.shop/api
https://ballotnwu.site/api
https://stogeneratmns.shop/api
https://fragnantbui.shop/api
https://drawzhotdog.shop/api
https://vozmeatillu.shop/api
https://offensivedzvju.shop/api
https://ghostreedmnu.shop/api
https://gutterydhowi.shop/api
https://teenylogicod.shop/api
https://ballotnwu.site/api
Verdict:
Malicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
ae3cb6c6afba9a4aa5c85f66023c35338ca579b30326dd02918f9d55259503d5
MD5 hash:
366fd6f3a451351b5df2d7c4ecf4c73a
SHA1 hash:
50db750522b9630757f91b53df377fd4ed4e2d66
SH256 hash:
934d882efd3c0f3f1efbc238ef87708f3879f5bb456d30af62f3368d58b6aa4c
MD5 hash:
d029339c0f59cf662094eddf8c42b2b5
SHA1 hash:
a0b6de44255ce7bfade9a5b559dd04f2972bfdc8
SH256 hash:
448402c129a721812fa1c5f279f5ca906b9c8bbca652a91655d144d20ce5e6b4
MD5 hash:
c8a2de7077f97d4bce1a44317b49ef41
SHA1 hash:
6cb3212ec9be08cb5a29bf8d37e9ca845efc18c9
SH256 hash:
47a1bbb47ede2daa62558515a9a4e98410a8b2d7c9e74fe5c45783969c48be39
MD5 hash:
1dfda6fc13c7efab9f6148e7339ab80c
SHA1 hash:
d5c7e9b3bc28e876ae223f9a6dd9b4d7f6cda9fd
Malware family:
Lumma
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
| CHECK_PIE | Missing Position-Independent Executable (PIE) Protection | high |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| COM_BASE_API | Can Download & Execute components | ole32.dll::CoCreateInstance ole32.dll::CreateStreamOnHGlobal |
| SHELL_API | Manipulates System Shell | SHELL32.dll::ShellExecuteExW SHELL32.dll::ShellExecuteW SHELL32.dll::SHGetFileInfoW |
| WIN32_PROCESS_API | Can Create Process and Threads | KERNEL32.dll::CloseHandle KERNEL32.dll::CreateThread |
| WIN_BASE_API | Uses Win Base API | KERNEL32.dll::LoadLibraryA KERNEL32.dll::GetDriveTypeW KERNEL32.dll::GetStartupInfoA KERNEL32.dll::GetDiskFreeSpaceExW KERNEL32.dll::GetCommandLineW |
| WIN_BASE_IO_API | Can Create Files | KERNEL32.dll::CreateDirectoryW KERNEL32.dll::CreateFileW KERNEL32.dll::DeleteFileW KERNEL32.dll::GetSystemDirectoryW KERNEL32.dll::GetFileAttributesW KERNEL32.dll::FindFirstFileW |
| WIN_USER_API | Performs GUI Actions | USER32.dll::CreateWindowExW |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.