MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 82bf998ee07f0549a68b9904d760f7b0fd47ee68f08a59a26de171b6dc8ea3db. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LummaStealer


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: 82bf998ee07f0549a68b9904d760f7b0fd47ee68f08a59a26de171b6dc8ea3db
SHA3-384 hash: dbe533d47690d8475b42781a4f61808df48eaf30dd7431512c69a54b6e75edc6923881ae4ff058a5630d4f3ebb2821cb
SHA1 hash: 3ba1c8da9007962e2e709cc95ac5100f2d778423
MD5 hash: 3abee03fcf96393d99f682ad634d4f0f
humanhash: wolfram-equal-rugby-idaho
File name:3abee03fcf96393d99f682ad634d4f0f.exe
Download: download sample
Signature LummaStealer
File size:3'778'048 bytes
First seen:2023-12-17 18:00:10 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader)
ssdeep 98304:hU5B0R7+ppe0GXNbvA6Shr1XqYJgcQDU+u+O41+x+sLfxdGoCE:7+XeVXNbvA60r1XDX+O41qZUrE
TLSH T1A506334399818032CCB937715EFA02430E667C9505ECC61F6E4F6A6E4D76AB4397A33B
TrID 41.1% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
22.2% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
11.8% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
7.5% (.EXE) Win64 Executable (generic) (10523/12/4)
4.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
File icon (PE):PE icon
dhash icon f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader)
Reporter abuse_ch
Tags:exe LummaStealer


Avatar
abuse_ch
LummaStealer C2:
http://diagramfiremonkeyowwa.fun/api

Intelligence


File Origin
# of uploads :
1
# of downloads :
422
Origin country :
NL NL
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Creating a window
Launching a process
Behavior that indicates a threat
Searching for the browser window
DNS request
Sending a custom TCP request
Launching the default Windows debugger (dwwin.exe)
Query of malicious DNS domain
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
89%
Tags:
advpack anti-vm CAB control explorer installer lolbin packed rundll32 setupapi sfx shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
LummaC Stealer, RisePro Stealer, SmokeLo
Detection:
malicious
Classification:
phis.troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Contains functionality to modify clipboard data
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found API chain indicative of sandbox detection
Found evasive API chain (may stop execution after checking computer name)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
Phishing site detected (based on logo match)
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Snort IDS alert for network traffic
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected LummaC Stealer
Yara detected RisePro Stealer
Yara detected SmokeLoader
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1363656 Sample: ypIJ3miGfG.exe Startdate: 17/12/2023 Architecture: WINDOWS Score: 100 135 soupinterestoe.fun 2->135 137 reviveincapablewew.pw 2->137 139 11 other IPs or domains 2->139 157 Snort IDS alert for network traffic 2->157 159 Multi AV Scanner detection for domain / URL 2->159 161 Found malware configuration 2->161 163 17 other signatures 2->163 12 ypIJ3miGfG.exe 1 4 2->12         started        15 MaxLoonaFest131.exe 2->15         started        18 FANBooster131.exe 2->18         started        20 5 other processes 2->20 signatures3 process4 file5 129 2 other malicious files 12->129 dropped 22 fi8Wq40.exe 1 4 12->22         started        113 C:\Users\user\AppData\Local\...\sqlite3.dll, PE32 15->113 dropped 115 C:\...\Jf9Xz7mVTWT9gO7O7DL7fXB87g7ud9Uk.zip, Zip 15->115 dropped 201 Multi AV Scanner detection for dropped file 15->201 203 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 15->203 205 Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines) 15->205 219 5 other signatures 15->219 26 WerFault.exe 15->26         started        117 C:\Users\user\AppData\Local\...\sqlite3.dll, PE32 18->117 dropped 119 C:\...behaviorgraph2A5ixDx7bl6sgpbLhVJmarguP7AwLPp.zip, Zip 18->119 dropped 207 Detected unpacking (changes PE section rights) 18->207 209 Query firmware table information (likely to detect VMs) 18->209 211 Tries to steal Mail credentials (via file / registry access) 18->211 28 WerFault.exe 18->28         started        121 C:\Users\user\AppData\Local\...\sqlite3.dll, PE32 20->121 dropped 123 C:\Users\user\AppData\Local\...\sqlite3.dll, PE32 20->123 dropped 125 C:\Users\user\AppData\Local\...\sqlite3.dll, PE32 20->125 dropped 127 C:\...\6IomDTvPmjtzSnp1bUl0CpPxVODA4F6g.zip, Zip 20->127 dropped 213 Machine Learning detection for dropped file 20->213 215 Tries to harvest and steal browser information (history, passwords, etc) 20->215 217 Hides threads from debuggers 20->217 30 WerFault.exe 20->30         started        32 WerFault.exe 20->32         started        34 WerFault.exe 20->34         started        36 WerFault.exe 20->36         started        signatures6 process7 file8 97 C:\Users\user\AppData\Local\...\AM8Kq31.exe, PE32 22->97 dropped 99 C:\Users\user\AppData\Local\...\4sp794sU.exe, PE32 22->99 dropped 165 Antivirus detection for dropped file 22->165 167 Multi AV Scanner detection for dropped file 22->167 169 Machine Learning detection for dropped file 22->169 38 4sp794sU.exe 22->38         started        43 AM8Kq31.exe 1 4 22->43         started        signatures9 process10 dnsIp11 141 91.92.249.253 THEZONEBG Bulgaria 38->141 143 ipinfo.io 34.117.186.192 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 38->143 101 C:\Users\user\AppData\Local\...\sqlite3.dll, PE32 38->101 dropped 103 C:\Users\user\AppData\...\FANBooster131.exe, PE32 38->103 dropped 105 C:\Users\user\AppData\...\MaxLoonaFest131.exe, PE32 38->105 dropped 111 2 other malicious files 38->111 dropped 171 Multi AV Scanner detection for dropped file 38->171 173 Detected unpacking (changes PE section rights) 38->173 175 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 38->175 183 8 other signatures 38->183 45 cmd.exe 38->45         started        48 cmd.exe 38->48         started        50 WerFault.exe 38->50         started        107 C:\Users\user\AppData\Local\...\2BO4665.exe, PE32 43->107 dropped 109 C:\Users\user\AppData\Local\...\1RE45YS6.exe, PE32 43->109 dropped 177 Antivirus detection for dropped file 43->177 179 Binary is likely a compiled AutoIt script file 43->179 181 Machine Learning detection for dropped file 43->181 52 1RE45YS6.exe 12 43->52         started        54 2BO4665.exe 43->54         started        file12 signatures13 process14 dnsIp15 185 Uses schtasks.exe or at.exe to add and modify task schedules 45->185 57 conhost.exe 45->57         started        59 schtasks.exe 45->59         started        61 conhost.exe 48->61         started        63 schtasks.exe 48->63         started        187 Multi AV Scanner detection for dropped file 52->187 189 Binary is likely a compiled AutoIt script file 52->189 191 Found API chain indicative of sandbox detection 52->191 193 Contains functionality to modify clipboard data 52->193 65 chrome.exe 1 52->65         started        68 chrome.exe 52->68         started        70 chrome.exe 52->70         started        74 6 other processes 52->74 145 diagramfiremonkeyowwa.fun 104.21.18.224 CLOUDFLARENETUS United States 54->145 147 soupinterestoe.fun 104.21.24.252 CLOUDFLARENETUS United States 54->147 149 3 other IPs or domains 54->149 195 Detected unpacking (changes PE section rights) 54->195 197 Detected unpacking (overwrites its own PE header) 54->197 199 Found evasive API chain (may stop execution after checking computer name) 54->199 72 WerFault.exe 21 16 54->72         started        signatures16 process17 dnsIp18 131 192.168.2.4 unknown unknown 65->131 133 239.255.255.250 unknown Reserved 65->133 76 chrome.exe 65->76         started        79 chrome.exe 65->79         started        81 chrome.exe 6 65->81         started        83 chrome.exe 68->83         started        85 chrome.exe 70->85         started        87 chrome.exe 74->87         started        89 chrome.exe 74->89         started        91 chrome.exe 74->91         started        93 3 other processes 74->93 process19 dnsIp20 151 tpop-api.twitter.com 104.244.42.2 TWITTERUS United States 76->151 153 twitter.com 104.244.42.65 TWITTERUS United States 76->153 155 101 other IPs or domains 76->155 95 WerFault.exe 76->95         started        process21
Threat name:
Win32.Spyware.Lummastealer
Status:
Malicious
First seen:
2023-12-17 18:01:06 UTC
File Type:
PE (Exe)
Extracted files:
230
AV detection:
20 of 23 (86.96%)
Threat level:
  2/5
Verdict:
unknown
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:lumma family:redline family:smokeloader botnet:@oleh_ps backdoor infostealer persistence stealer themida trojan
Behaviour
Creates scheduled task(s)
Modifies Internet Explorer settings
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
AutoIT Executable
Adds Run key to start application
Executes dropped EXE
Loads dropped DLL
Themida packer
Detect Lumma Stealer payload V4
Lumma Stealer
RedLine
RedLine payload
SmokeLoader
Malware Config
C2 Extraction:
http://soupinterestoe.fun/api
http://dayfarrichjwclik.fun/api
http://neighborhoodfeelsa.fun/api
http://ratefacilityframw.fun/api
http://185.215.113.68/fks/index.php
176.123.7.190:32927
Unpacked files
SH256 hash:
6851e02d3f4b8179b975f00bbc86602a2f2f84524f548876eb656db7ea5eaa9c
MD5 hash:
c5124caf4aea3a83b63a9108fe0dcef8
SHA1 hash:
a43a5a59038fca5a63fa526277f241f855177ce6
SH256 hash:
fb2ffd61b1600b318a5814d60601afd0d9b4602b6fb4bf8e13f21da7fff2cabd
MD5 hash:
51056dd7b1a40e49623a28e27ef8aa19
SHA1 hash:
4f603d1c71429f03a7762347845ba1d0f8c47b10
Detections:
AutoIT_Compiled
Parent samples :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 hash:
2b2d01ab472374bcdf96a3c3ec5190de24450b4c62236dfc9dbed6d849063578
MD5 hash:
6857412279e30566fbf8bd47281f71e2
SHA1 hash:
417951a7c47f7e5b43e7a43eaa0ce1bdfc29a0c8
SH256 hash:
c8c0f2dcaa77aac5e89a1404e546e93e9f9a86907fe1d1eec8d293565eab6a41
MD5 hash:
a04fa4dfcab06f8d7dd063bcd05a1f8a
SHA1 hash:
aa1e1aac4ab309eb860de91d2a8b35e7c39949f1
Detections:
win_lumma_a0
SH256 hash:
82bf998ee07f0549a68b9904d760f7b0fd47ee68f08a59a26de171b6dc8ea3db
MD5 hash:
3abee03fcf96393d99f682ad634d4f0f
SHA1 hash:
3ba1c8da9007962e2e709cc95ac5100f2d778423
Detections:
win_redline_wextract_hunting_oct_2023
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

LummaStealer

Executable exe 82bf998ee07f0549a68b9904d760f7b0fd47ee68f08a59a26de171b6dc8ea3db

(this sample)

  
Delivery method
Distributed via web download

Comments