MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4c329bdcdbb6e836ea8f8d71a02e601d0e3643172e15e2c610015f881eacc535. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LummaStealer


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 4c329bdcdbb6e836ea8f8d71a02e601d0e3643172e15e2c610015f881eacc535
SHA3-384 hash: b99af2278b919a11e5646ea2a19b0bbe0dcbb7f0dcddb83ad679a266cc7f110218a82a474ea2894edc9af6f552233bbe
SHA1 hash: d94ae0311429c2f865a190199b4cbe6597fe883e
MD5 hash: ce1a7a14bf0e15545df02619e3b7decc
humanhash: mike-jig-kitten-mars
File name:giga.zip
Download: download sample
Signature LummaStealer
File size:1'155'350 bytes
First seen:2024-09-25 14:18:14 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 24576:NRcKm9Cq7G25ekuwlXlIEfLM/KKSbbuVIE91PL:NRcf9d66gwNeKKSbbqNL
TLSH T1A535025DD9C33EE9CA688E35E0523FB46610DC14B8338AB307155EDA6FEB654CE1309A
Magika zip
Reporter NDA0E
Tags:LummaStealer zip

Intelligence


File Origin
# of uploads :
1
# of downloads :
464
Origin country :
NL NL
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:KneeMarking.exe
File size:92'274'688 bytes
SHA256 hash: 9fcb457a89551c5ab94303779ebfc4737bd74be935a1ac68cda0d22bb51b3202
MD5 hash: 2857272927b6bb6d2ca396778b859b2d
MIME type:application/x-dosexec
Signature LummaStealer
Vendor Threat Intelligence
Verdict:
Malicious
Score:
90.9%
Tags:
Banker Discovery Encryption Execution Network Trojan Dexter Infosteal Exploit Sage Tori
Result
Verdict:
Suspicious
File Type:
PE File
Behaviour
BlacklistAPI detected
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
lolbin overlay shell32
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2024-09-23 06:47:10 UTC
File Type:
Binary (Archive)
Extracted files:
13
AV detection:
14 of 24 (58.33%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:lumma discovery spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Browser Information Discovery
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Windows directory
Enumerates processes with tasklist
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Lumma Stealer, LummaC
Malware Config
C2 Extraction:
https://performenj.shop/api
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

LummaStealer

zip 4c329bdcdbb6e836ea8f8d71a02e601d0e3643172e15e2c610015f881eacc535

(this sample)

  
Delivery method
Distributed via web download

Comments