MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4ecc70dba52b81e7668f938d59f916a8ed4a0b8604b6a0278c39a4275d3d45d7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LummaStealer


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 4ecc70dba52b81e7668f938d59f916a8ed4a0b8604b6a0278c39a4275d3d45d7
SHA3-384 hash: e1f4ddfbd9412ecd5838dc7e9e0106af56f0c4551a0c503599b6114d5f4fbe9dfa43fbf10d7492ebe2b408f270843eae
SHA1 hash: b4af5f7ff775e1b886a2e91a8176a230d4d75572
MD5 hash: 21d07e51cece5ec8d6da1280e3002d07
humanhash: september-utah-carbon-shade
File name:Vortex Loader.bat
Download: download sample
Signature LummaStealer
File size:7'004 bytes
First seen:2025-02-13 07:14:19 UTC
Last seen:Never
File type:Batch (bat) bat
MIME type:text/plain
ssdeep 192:slTunmn882limVgaduii2onnpiPki1kiikitCn9CnnNniAT/8Ykl+l2limulZSlZ:slTunmn882limVgaduii2onnpiPki1kc
Threatray 2 similar samples on MalwareBazaar
TLSH T129E1A6AAADA3F23422A94CFEDD2DF86467373318465851733AA4B93D050F3C78964D38
Magika txt
Reporter JAMESWT_WT
Tags:147-45-44-42 bat booking LummaStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
117
Origin country :
IT IT
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Vortex Loader.bat
Verdict:
Malicious activity
Analysis date:
2025-02-13 07:17:01 UTC
Tags:
loader lumma stealer auto

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
92.5%
Tags:
obfuscate shell sage
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
evasive powershell
Result
Verdict:
UNKNOWN
Result
Threat name:
LummaC Stealer
Detection:
malicious
Classification:
troj.expl.evad
Score:
100 / 100
Signature
.NET source code contains very large strings
.NET source code references suspicious native API functions
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Compiles code for process injection (via .Net compiler)
Found malware configuration
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Sample uses string decryption to hide its real strings
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Silenttrinity Stager Msbuild Activity
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Writes to foreign memory regions
Yara detected LummaC Stealer
Behaviour
Behavior Graph:
Result
Malware family:
n/a
Score:
  10/10
Tags:
discovery execution
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
System Network Configuration Discovery: Internet Connection Discovery
Command and Scripting Interpreter: PowerShell
Blocklisted process makes network request
Downloads MZ/PE file
Malware Config
Dropper Extraction:
http://147.45.44.42/boom/trcgfj.exe
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments