MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 78f6ec9bdda9c44122ae81fd6b0ac6f04e8c68166243dd3c77a7315d158b1c83. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LummaStealer


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 78f6ec9bdda9c44122ae81fd6b0ac6f04e8c68166243dd3c77a7315d158b1c83
SHA3-384 hash: 4cee3ccfb63e8e2ed632dad357b35adc5c2140b17c53eb9b59172e452e3452a9372ad4ec56811d4738a4601e055950bd
SHA1 hash: 8eb6f031fbc702a8f327e636c035f86da9b93f9e
MD5 hash: 1168e44d288d2ce3f552e44dfb9ac65f
humanhash: arizona-oregon-london-rugby
File name:next-step-v23.b-cdn.net.ps1
Download: download sample
Signature LummaStealer
File size:185 bytes
First seen:2024-10-01 14:19:09 UTC
Last seen:Never
File type:PowerShell (PS) ps1
MIME type:text/plain
ssdeep 3:VSJJLNyqM3AxRm0uMYmVCAFhL2+3HlxTA5LWA+OtTH3x8JdNEyOGA4Ri7Q5LWA58:snyHKmmVCsh2+XjJQLh8JdWzZMT0ghqR
TLSH T13FC0C0332C35F225C382A06070109588B03360003841C0F5BFD41CCE09C1770A011049
Magika powershell
Reporter aachum
Tags:ps1


Avatar
iamaachum
https://next-step-v23.b-cdn.net/h-verify/proceed/human-check-h222.html

Intelligence


File Origin
# of uploads :
1
# of downloads :
135
Origin country :
ES ES
Vendor Threat Intelligence
Verdict:
Malicious
Score:
92.5%
Tags:
Powershell Gumen Rapid
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
masquerade powershell
Verdict:
Suspicious
Labled as:
TrojanDownloader/PS.NetLoader
Result
Verdict:
UNKNOWN
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
52 / 100
Signature
AI detected suspicious sample
Loading BitLocker PowerShell Module
Suspicious powershell command line found
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1523459 Sample: next-step-v23.b-cdn.net.ps1 Startdate: 01/10/2024 Architecture: WINDOWS Score: 52 15 198.187.3.20.in-addr.arpa 2->15 17 AI detected suspicious sample 2->17 7 powershell.exe 19 2->7         started        signatures3 process4 signatures5 19 Suspicious powershell command line found 7->19 10 powershell.exe 23 7->10         started        13 conhost.exe 7->13         started        process6 signatures7 21 Loading BitLocker PowerShell Module 10->21
Result
Malware family:
n/a
Score:
  8/10
Tags:
execution
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: PowerShell
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

LummaStealer

PowerShell (PS) ps1 78f6ec9bdda9c44122ae81fd6b0ac6f04e8c68166243dd3c77a7315d158b1c83

(this sample)

  
Dropping
LummaStealer
  
Delivery method
Distributed via web download

Comments