MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4d0b50e69d551bf15ec0a44c8471f8766ca5b98bd3b462c3bf0e976c76c1308b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LummaStealer


Vendor detections: 17


Intelligence 17 IOCs YARA File information Comments

SHA256 hash: 4d0b50e69d551bf15ec0a44c8471f8766ca5b98bd3b462c3bf0e976c76c1308b
SHA3-384 hash: 8dac550498cf764a5eae2a360cada737ffe4d032c0be4834d17cf1ca471be2ad521851903f533e0a08c0b7e0815640b5
SHA1 hash: ff4c5ccd4c1f5ef53a6ae2fb8b0a5ecf3ebfbfad
MD5 hash: 535a840121f23c3f10abd00891dce6e6
humanhash: spring-august-eleven-fish
File name:file
Download: download sample
Signature LummaStealer
File size:6'138'816 bytes
First seen:2024-09-09 14:13:41 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'661 x AgentTesla, 19'473 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 49152:916jZg1DvQtV6sqFefM6xK5u3z+pSV4x9BLZmU6X9KpLbQQ4oda133/9kpjVfNzI:iji1SBqFebRz+hK
TLSH T1A456D820FB801BECC91792FEC66695E19CADC54037032D95AF2F636E23114D8B36A57E
TrID 67.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
9.7% (.EXE) Win64 Executable (generic) (10523/12/4)
6.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
4.1% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
File icon (PE):PE icon
dhash icon 924892b2c8480348 (2 x LummaStealer)
Reporter Bitsight
Tags:exe LummaStealer


Avatar
Bitsight
url: http://147.45.44.104/yuop/66db20fa69d49_soundcloud_20240906182624.exe#upus

Intelligence


File Origin
# of uploads :
1
# of downloads :
410
Origin country :
US US
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2024-09-09 14:15:10 UTC
Tags:
lumma stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
96.5%
Tags:
Encryption Static Stealth
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Launching a process
DNS request
Connection attempt
Sending a custom TCP request
Behavior that indicates a threat
Connection attempt to an infection source
Query of malicious DNS domain
Sending a TCP request to an infection source
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
cerberus overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Found malware configuration
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Sample uses string decryption to hide its real strings
Suricata IDS alerts for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected Costura Assembly Loader
Yara detected LummaC Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Spyware.Lummastealer
Status:
Malicious
First seen:
2024-09-06 16:49:21 UTC
File Type:
PE (.Net Exe)
Extracted files:
11
AV detection:
16 of 24 (66.67%)
Threat level:
  2/5
Verdict:
malicious
Result
Malware family:
Score:
  10/10
Tags:
family:lumma discovery stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Lumma Stealer, LummaC
Suspicious use of NtCreateUserProcessOtherParentProcess
Malware Config
C2 Extraction:
https://cutesliprpepo.shop/api
https://tenntysjuxmz.shop/api
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
2cad5d42278d5e9f4969e6b66920a5fd68f806119109f18eee22b04d933166bc
MD5 hash:
605fc638cf3e212126a1537d0b67218a
SHA1 hash:
251dfaa2a714dab1bc09bade4616714c6998e899
Detections:
LummaStealer
SH256 hash:
b7d1c4268d698aedc526a8148f053b99ec886c9a509713b14d8083258ddedd89
MD5 hash:
0f9d3649b06b4443b67e498d0a098264
SHA1 hash:
c71f6f829a51c15cb9ea0e30ee8471d9501ee9d7
SH256 hash:
9fba3c3eb29ed12c3981df9835f0f37231cb4f3df8b60ca718dd88aa79e8f4fa
MD5 hash:
93c03ece011d3661157e17388f1a734a
SHA1 hash:
79f1291dc79e2d513313c5a4a2bf008b552f54db
SH256 hash:
78f73e1734daa918b253517c75971fbb8df773a3d77d02a752e9a0ad1711a677
MD5 hash:
f9d2985aa1c41cca281321fffb5ed424
SHA1 hash:
3a7a58d2dcae2762882357ae34d372744b1dbb9d
SH256 hash:
ab5faf91447e0deafdd7199d6f701dbf9f66b13b558cfc4d586a06c6f71c727b
MD5 hash:
0ae5a435c4d33b77e876bf8581c9ac75
SHA1 hash:
1c5a10a0ccb81ddcd744760857fc7fba9df29915
SH256 hash:
7d57abe01d67ec6e6ceb8a8de0a308e934900eab690ccbb24576484415483fa7
MD5 hash:
7ffd1cd64b8a264b20bfab89619e2293
SHA1 hash:
216194909c3d19ec0df883d30853f191c6608174
Detections:
SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
4d0b50e69d551bf15ec0a44c8471f8766ca5b98bd3b462c3bf0e976c76c1308b
MD5 hash:
535a840121f23c3f10abd00891dce6e6
SHA1 hash:
ff4c5ccd4c1f5ef53a6ae2fb8b0a5ecf3ebfbfad
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

LummaStealer

Executable exe 4d0b50e69d551bf15ec0a44c8471f8766ca5b98bd3b462c3bf0e976c76c1308b

(this sample)

  
Dropped by
Privateloader
  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (GUARD_CF)high

Comments