MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 53fa7d3087b6a6dce7ac7b28c28e5385e9232c3869d07d569ea6f24db43888b8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LummaStealer


Vendor detections: 13


Intelligence 13 IOCs YARA 6 File information Comments

SHA256 hash: 53fa7d3087b6a6dce7ac7b28c28e5385e9232c3869d07d569ea6f24db43888b8
SHA3-384 hash: e7d8e43b138bcfa4de53ca74b6bf334a5e8d6fabf2849cf7efe3179bfa988597e24c957329f0d630ba0b06476f343d70
SHA1 hash: 1a12480c4eab6e8d2efba288e49e9461ea90b18e
MD5 hash: 2df03e1b84d452c2053d47b0f593d855
humanhash: pip-mango-four-eight
File name:2df03e1b84d452c2053d47b0f593d855.exe
Download: download sample
Signature LummaStealer
File size:966'656 bytes
First seen:2023-11-29 08:10:35 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 87161a064f5daa4a79ca02075d04f281 (3 x RedLineStealer, 3 x LummaStealer)
ssdeep 12288:VWJtO2qFC1w9J02SRCdFTb766TO0cMI9dbwaCDbCbu5kVwdm:Vd2qk1w9J02SRCTmWR5I5CDbCf
Threatray 4'303 similar samples on MalwareBazaar
TLSH T1EC258D2138C08572EDE3E0B742EDFA2602ADD4B0072556CF16D85BFEEB606C17B36596
TrID 32.2% (.EXE) Win64 Executable (generic) (10523/12/4)
20.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
15.4% (.EXE) Win16 NE executable (generic) (5038/12/1)
13.7% (.EXE) Win32 Executable (generic) (4505/5/1)
6.2% (.EXE) OS/2 Executable (generic) (2029/13)
Reporter abuse_ch
Tags:exe LummaStealer


Avatar
abuse_ch
LummaStealer C2:
194.49.94.80:29960

Intelligence


File Origin
# of uploads :
1
# of downloads :
298
Origin country :
NL NL
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Launching a process
Сreating synchronization primitives
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Connecting to a non-recommended domain
Sending an HTTP POST request
Unauthorized injection to a system process
Enabling autorun by creating a file
Gathering data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Glupteba, LummaC Stealer, RedLine, Smoke
Detection:
malicious
Classification:
troj.spyw.expl.evad.mine
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Connects to many ports of the same IP (likely port scanning)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found API chain indicative of debugger detection
Found evasive API chain (may stop execution after checking system information)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found Tor onion address
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses process hollowing technique
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
UAC bypass detected (Fodhelper)
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected Costura Assembly Loader
Yara detected Generic Downloader
Yara detected Glupteba
Yara detected LummaC Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Xmrig cryptocurrency miner
Yara detected XWorm
Yara detected zgRAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1349761 Sample: M0b16pOsSO.exe Startdate: 29/11/2023 Architecture: WINDOWS Score: 100 117 tungphamblog.com 2->117 119 transfer.digitalmonks.org 2->119 121 32 other IPs or domains 2->121 155 Multi AV Scanner detection for domain / URL 2->155 157 Found malware configuration 2->157 159 Malicious sample detected (through community Yara rule) 2->159 161 22 other signatures 2->161 13 M0b16pOsSO.exe 1 2->13         started        16 XsdType.exe 2->16         started        18 vevscfj 2->18         started        signatures3 process4 signatures5 213 Contains functionality to inject code into remote processes 13->213 215 Writes to foreign memory regions 13->215 217 Allocates memory in foreign processes 13->217 219 Injects a PE file into a foreign processes 13->219 20 AppLaunch.exe 13->20         started        23 AppLaunch.exe 13->23         started        25 conhost.exe 13->25         started        221 Antivirus detection for dropped file 16->221 223 Multi AV Scanner detection for dropped file 16->223 225 Machine Learning detection for dropped file 16->225 227 2 other signatures 16->227 27 XsdType.exe 16->27         started        process6 signatures7 163 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 20->163 165 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 20->165 167 Maps a DLL or memory area into another process 20->167 181 2 other signatures 20->181 29 explorer.exe 34 37 20->29 injected 169 Found evasive API chain (may stop execution after checking system information) 23->169 171 Found API chain indicative of debugger detection 23->171 173 Writes to foreign memory regions 27->173 175 Modifies the context of a thread in another process (thread injection) 27->175 177 Sample uses process hollowing technique 27->177 179 Injects a PE file into a foreign processes 27->179 34 InstallUtil.exe 27->34         started        process8 dnsIp9 133 lb.zenjabba.com 208.99.62.244 ST-BGPUS Reserved 29->133 135 185.196.8.238, 49712, 80 SIMPLECARRER2IT Switzerland 29->135 137 6 other IPs or domains 29->137 95 C:\Users\user\AppData\Roaming\swvscfj, PE32 29->95 dropped 97 C:\Users\user\AppData\Local\TempEEA.exe, PE32 29->97 dropped 99 C:\Users\user\AppData\Local\Temp822.exe, PE32 29->99 dropped 101 12 other files (11 malicious) 29->101 dropped 229 System process connects to network (likely due to code injection or exploit) 29->229 231 Benign windows process drops PE files 29->231 233 Hides that the sample has been downloaded from the Internet (zone.identifier) 29->233 36 8F3A.exe 29->36         started        40 6923.exe 3 29->40         started        42 5FBC.exe 4 29->42         started        45 6 other processes 29->45 235 Modifies the context of a thread in another process (thread injection) 34->235 237 Sample uses process hollowing technique 34->237 239 Injects a PE file into a foreign processes 34->239 file10 signatures11 process12 dnsIp13 81 C:\Users\user\AppData\Local\Temp\tuc3.exe, PE32 36->81 dropped 83 C:\Users\user\AppData\Local\...\toolspub2.exe, PE32 36->83 dropped 85 C:\Users\user\AppData\Local\...\latestX.exe, PE32+ 36->85 dropped 91 2 other malicious files 36->91 dropped 183 Multi AV Scanner detection for dropped file 36->183 47 tuc3.exe 36->47         started        51 31839b57a4f11171d6abc8bbc4451ee4.exe 36->51         started        53 toolspub2.exe 36->53         started        64 3 other processes 36->64 185 Antivirus detection for dropped file 40->185 187 Machine Learning detection for dropped file 40->187 189 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 40->189 201 2 other signatures 40->201 55 6923.exe 5 40->55         started        57 svchost.exe 40->57         started        125 194.169.175.235, 42691, 49713 CLOUDCOMPUTINGDE Germany 42->125 191 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 42->191 193 Found many strings related to Crypto-Wallets (likely being stolen) 42->193 195 Tries to steal Crypto Currency Wallets 42->195 127 195.10.205.16 TSSCOM-ASRU Russian Federation 45->127 129 ip-api.com 208.95.112.1 TUT-ASUS United States 45->129 131 7 other IPs or domains 45->131 87 C:\Users\user\AppData\Roaming\wabzaZXb.exe, PE32 45->87 dropped 89 C:\Users\user\AppData\Local\Temp\...\A236.tmp, PE32 45->89 dropped 197 Tries to harvest and steal browser information (history, passwords, etc) 45->197 199 Injects a PE file into a foreign processes 45->199 60 A236.tmp 45->60         started        62 conhost.exe 45->62         started        66 2 other processes 45->66 file14 signatures15 process16 dnsIp17 111 C:\Users\user\AppData\Local\Temp\...\tuc3.tmp, PE32 47->111 dropped 139 Multi AV Scanner detection for dropped file 47->139 68 tuc3.tmp 47->68         started        141 Antivirus detection for dropped file 51->141 143 Detected unpacking (changes PE section rights) 51->143 145 Detected unpacking (overwrites its own PE header) 51->145 153 4 other signatures 51->153 147 Injects a PE file into a foreign processes 53->147 70 toolspub2.exe 53->70         started        113 C:\Users\user\AppData\Local\...\XsdType.exe, PE32+ 55->113 dropped 149 Found many strings related to Crypto-Wallets (likely being stolen) 55->149 123 127.0.0.1 unknown unknown 57->123 151 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 57->151 115 C:\Users\user\AppData\Local\Temp\Broom.exe, PE32 64->115 dropped 73 Broom.exe 64->73         started        file18 signatures19 process20 signatures21 75 tuc3.exe 68->75         started        203 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 70->203 205 Maps a DLL or memory area into another process 70->205 207 Checks if the current machine is a virtual machine (disk enumeration) 70->207 209 Creates a thread in another existing process (thread injection) 70->209 211 Multi AV Scanner detection for dropped file 73->211 process22 file23 93 C:\Users\user\AppData\Local\Temp\...\tuc3.tmp, PE32 75->93 dropped 78 tuc3.tmp 75->78         started        process24 file25 103 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 78->103 dropped 105 C:\Users\user\AppData\Local\...\_isdecmp.dll, PE32 78->105 dropped 107 C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32 78->107 dropped 109 13 other files (12 malicious) 78->109 dropped
Threat name:
Win32.Trojan.LummaStealer
Status:
Malicious
First seen:
2023-11-24 23:04:01 UTC
File Type:
PE (Exe)
AV detection:
29 of 37 (78.38%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:redline family:smokeloader family:xworm family:zgrat botnet:@ytlogsbot botnet:livetraffic botnet:up3 backdoor discovery evasion infostealer rat spyware stealer trojan
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Runs net.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Launches sc.exe
Drops file in System32 directory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Blocklisted process makes network request
Downloads MZ/PE file
Drops file in Drivers directory
Modifies Windows Firewall
Possible attempt to disable PatchGuard
Stops running service(s)
Modifies boot configuration data using bcdedit
Detect Xworm Payload
Detect ZGRat V1
RedLine
RedLine payload
SmokeLoader
Suspicious use of NtCreateUserProcessOtherParentProcess
Xworm
ZGRat
Malware Config
C2 Extraction:
http://194.49.94.210/fks/index.php
194.169.175.235:42691
personal-singing.gl.at.ply.gg:32927
195.10.205.16:2245
Unpacked files
SH256 hash:
53fa7d3087b6a6dce7ac7b28c28e5385e9232c3869d07d569ea6f24db43888b8
MD5 hash:
2df03e1b84d452c2053d47b0f593d855
SHA1 hash:
1a12480c4eab6e8d2efba288e49e9461ea90b18e
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:NET
Author:malware-lu
Rule name:pe_no_import_table
Description:Detect pe file that no import table

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments