MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5c2c5236a070484172295dad089f4ad189e544c17600e20428b0cb100f46bc09. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LummaStealer


Vendor detections: 15


Intelligence 15 IOCs YARA 2 File information Comments

SHA256 hash: 5c2c5236a070484172295dad089f4ad189e544c17600e20428b0cb100f46bc09
SHA3-384 hash: dee32c214bb8cf7e9d1b3892891338b1544b6bddd45752b9ec872c52c95a8196f204fa0a468029539e89b4d6031c9c8c
SHA1 hash: 9cd19f7997747e0557e22f4248b2022a6aa94609
MD5 hash: 792138004136f125d3e5092daec53f75
humanhash: sodium-oregon-lima-salami
File name:792138004136f125d3e5092daec53f75.exe
Download: download sample
Signature LummaStealer
File size:1'296'384 bytes
First seen:2023-12-11 01:25:28 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader)
ssdeep 24576:i9y+4FsVKQd4pYrCMzWcT16zK7BnMyXnrI541ZJo2j1YykSIVD:vFNQUaWcT16zK7ZF1Z
TLSH T1CB552312ABDC2172D9B113B018FB064F1F33BCF198FA575A1B8A69961C727E48036736
TrID 41.1% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
22.2% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
11.8% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
7.5% (.EXE) Win64 Executable (generic) (10523/12/4)
4.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
File icon (PE):PE icon
dhash icon f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader)
Reporter abuse_ch
Tags:exe LummaStealer


Avatar
abuse_ch
LummaStealer C2:
http://castlesideopwas.pw/api

Intelligence


File Origin
# of uploads :
1
# of downloads :
337
Origin country :
NL NL
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Creating a file in the Windows subdirectories
Сreating synchronization primitives
Modifying a system file
Creating a file
Replacing files
Launching a process
Launching a service
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Reading critical registry keys
Sending a UDP request
Forced system process termination
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Searching for the window
Blocking the Windows Defender launch
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Sending a TCP request to an infection source
Stealing user critical data
Adding exclusions to Windows Defender
Enabling autorun by creating a file
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
advpack anti-vm autoit CAB control explorer greyware installer keylogger lolbin packed rundll32 setupapi sfx shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Glupteba, LummaC Stealer, PrivateLoader,
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
Adds extensions / path to Windows Defender exclusion list (Registry)
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject threads in other processes
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender real time protection (registry)
Disables Windows Defender (deletes autostart)
Exclude list of file types from scheduled, custom, and real-time scanning
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found stalling execution ending in API Sleep call
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies Group Policy settings
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses process hollowing technique
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
UAC bypass detected (Fodhelper)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Glupteba
Yara detected LummaC Stealer
Yara detected PrivateLoader
Yara detected RedLine Stealer
Yara detected RisePro Stealer
Yara detected SmokeLoader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1358033 Sample: rrg6EqyoDj.exe Startdate: 11/12/2023 Architecture: WINDOWS Score: 100 120 ipinfo.io 2->120 134 Multi AV Scanner detection for domain / URL 2->134 136 Found malware configuration 2->136 138 Malicious sample detected (through community Yara rule) 2->138 140 15 other signatures 2->140 12 rrg6EqyoDj.exe 1 4 2->12         started        16 OfficeTrackerNMP131.exe 10 501 2->16         started        18 OfficeTrackerNMP131.exe 2->18         started        20 11 other processes 2->20 signatures3 process4 file5 106 C:\Users\user\AppData\Local\...\Fx2mB20.exe, PE32 12->106 dropped 108 C:\Users\user\AppData\Local\...\6lA1wc1.exe, PE32 12->108 dropped 186 Binary is likely a compiled AutoIt script file 12->186 22 Fx2mB20.exe 1 4 12->22         started        188 Antivirus detection for dropped file 16->188 190 Multi AV Scanner detection for dropped file 16->190 192 Tries to steal Mail credentials (via file / registry access) 16->192 202 5 other signatures 16->202 26 WerFault.exe 16->26         started        110 C:\...\Zonvzymr3mfq7be15evPNgz8jTCmD1b6.zip, Zip 18->110 dropped 194 Found many strings related to Crypto-Wallets (likely being stolen) 18->194 196 Disables Windows Defender (deletes autostart) 18->196 198 Tries to harvest and steal browser information (history, passwords, etc) 18->198 28 WerFault.exe 18->28         started        200 Machine Learning detection for dropped file 20->200 30 WerFault.exe 20->30         started        32 WerFault.exe 20->32         started        34 WerFault.exe 20->34         started        signatures6 process7 file8 82 C:\Users\user\AppData\Local\...\4yH947Gz.exe, PE32 22->82 dropped 84 C:\Users\user\AppData\Local\...\1ZY25pn4.exe, PE32 22->84 dropped 170 Multi AV Scanner detection for dropped file 22->170 36 4yH947Gz.exe 22->36         started        39 1ZY25pn4.exe 11 508 22->39         started        signatures9 process10 dnsIp11 142 Multi AV Scanner detection for dropped file 36->142 144 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 36->144 146 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 36->146 154 3 other signatures 36->154 43 explorer.exe 36->43 injected 122 ipinfo.io 34.117.59.81, 443, 49731, 49733 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 39->122 124 193.233.132.51, 49729, 49730, 49732 FREE-NET-ASFREEnetEU Russian Federation 39->124 96 C:\Users\user\AppData\...\FANBooster131.exe, PE32 39->96 dropped 98 C:\Users\user\AppData\...\MaxLoonaFest131.exe, PE32 39->98 dropped 100 C:\ProgramData\...\OfficeTrackerNMP131.exe, PE32 39->100 dropped 102 2 other malicious files 39->102 dropped 148 Tries to steal Mail credentials (via file / registry access) 39->148 150 Found many strings related to Crypto-Wallets (likely being stolen) 39->150 152 Found stalling execution ending in API Sleep call 39->152 156 7 other signatures 39->156 48 schtasks.exe 1 39->48         started        50 schtasks.exe 1 39->50         started        52 WerFault.exe 39->52         started        file12 signatures13 process14 dnsIp15 130 185.172.128.19, 49755, 80 NADYMSS-ASRU Russian Federation 43->130 132 81.19.131.34, 49754, 80 IVC-ASRU Russian Federation 43->132 112 C:\Users\user\AppData\Local\Temp566.exe, PE32 43->112 dropped 114 C:\Users\user\AppData\Local\Temp\3A7F.exe, PE32 43->114 dropped 116 C:\Users\user\AppData\Local\Temp\31F2.exe, PE32 43->116 dropped 118 2 other malicious files 43->118 dropped 204 System process connects to network (likely due to code injection or exploit) 43->204 206 Benign windows process drops PE files 43->206 54 159E.exe 43->54         started        58 21F4.exe 43->58         started        61 E566.exe 43->61         started        63 31F2.exe 43->63         started        65 conhost.exe 48->65         started        67 conhost.exe 50->67         started        file16 signatures17 process18 dnsIp19 86 C:\Users\user\AppData\Local\Temp\tuc3.exe, PE32 54->86 dropped 88 C:\Users\user\AppData\Local\...\toolspub2.exe, PE32 54->88 dropped 90 C:\Users\user\AppData\Local\...\latestX.exe, PE32+ 54->90 dropped 94 2 other malicious files 54->94 dropped 172 Antivirus detection for dropped file 54->172 174 Multi AV Scanner detection for dropped file 54->174 176 Machine Learning detection for dropped file 54->176 69 31839b57a4f11171d6abc8bbc4451ee4.exe 54->69         started        72 toolspub2.exe 54->72         started        74 InstallSetup9.exe 54->74         started        77 InstallSetup9.exe 54->77         started        126 176.123.7.190 ALEXHOSTMD Moldova Republic of 58->126 178 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 58->178 180 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 58->180 182 Tries to harvest and steal browser information (history, passwords, etc) 58->182 128 77.105.132.87, 49760 PLUSTELECOM-ASRU Russian Federation 61->128 92 C:\Users\user\AppData\...\Protect544cd51a.dll, PE32 63->92 dropped 184 Sample uses process hollowing technique 63->184 file20 signatures21 process22 file23 158 Antivirus detection for dropped file 69->158 160 Multi AV Scanner detection for dropped file 69->160 162 Detected unpacking (changes PE section rights) 69->162 168 3 other signatures 69->168 164 Sample uses process hollowing technique 72->164 166 Injects a PE file into a foreign processes 72->166 104 C:\Users\user\AppData\Local\Temp\Broom.exe, PE32 74->104 dropped 79 Broom.exe 74->79         started        signatures24 process25 signatures26 208 Multi AV Scanner detection for dropped file 79->208
Threat name:
Win32.Trojan.RisePro
Status:
Malicious
First seen:
2023-12-11 01:26:05 UTC
File Type:
PE (Exe)
Extracted files:
101
AV detection:
18 of 23 (78.26%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:glupteba family:privateloader family:redline family:risepro family:smokeloader botnet:@oleh_ps botnet:livetraffic botnet:up3 backdoor brand:google brand:paypal collection discovery dropper evasion infostealer loader persistence phishing spyware stealer trojan
Behaviour
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Checks SCSI registry key(s)
Checks processor information in registry
Creates scheduled task(s)
Enumerates system info in registry
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Program crash
AutoIT Executable
Detected potential entity reuse from brand paypal.
Drops file in System32 directory
Accesses Microsoft Outlook profiles
Adds Run key to start application
Checks installed software on the system
Looks up external IP address via web service
Drops startup file
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Downloads MZ/PE file
Modifies Windows Firewall
Detected google phishing page
Glupteba
Glupteba payload
PrivateLoader
RedLine
RedLine payload
RisePro
SmokeLoader
Malware Config
C2 Extraction:
193.233.132.51
http://81.19.131.34/fks/index.php
77.105.132.87:6731
176.123.7.190:32927
http://host-file-host6.com/
http://host-host-file8.com/
Unpacked files
SH256 hash:
fc3e7e13b86b49af3b45bbba34e58a2167715a33f0eade6020c7c55663aea34b
MD5 hash:
36930c536c2a81c68839a4f0a02e683c
SHA1 hash:
87afbc08b78894bf5e7ded12b5ae0eba2e6ea86c
SH256 hash:
d5621892ab25e272fb4c232b070f4cca0aba89a8bc36a933bdb89a06a51e017b
MD5 hash:
1ce0a4fa98cae88abc28421354e84fc1
SHA1 hash:
6cdee0071890281fe30a458a2408322c82726e74
Detections:
win_smokeloader_a2
SH256 hash:
f5ee614ae3f48b872eb41a10b1f4e70920e3b6a0880d9b164082ab34c36a485b
MD5 hash:
eefeac084e594faf0891ff2800ca05b1
SHA1 hash:
b2929ca5c2ee3d4db90936343726a77cabf9e050
Detections:
AutoIT_Compiled
SH256 hash:
5c2c5236a070484172295dad089f4ad189e544c17600e20428b0cb100f46bc09
MD5 hash:
792138004136f125d3e5092daec53f75
SHA1 hash:
9cd19f7997747e0557e22f4248b2022a6aa94609
Detections:
win_redline_wextract_hunting_oct_2023
Malware family:
PrivateLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:detect_Redline_Stealer
Author:Varp0s
Rule name:win_redline_wextract_hunting_oct_2023
Author:Matthew @ Embee_Research
Description:Detects wextract archives related to redline/amadey

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

LummaStealer

Executable exe 5c2c5236a070484172295dad089f4ad189e544c17600e20428b0cb100f46bc09

(this sample)

  
Delivery method
Distributed via web download

Comments