MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a315e8d73a20a30705e91ff66461435df5a0b5482b093ae61cf48654bf433bac. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LummaStealer


Vendor detections: 15


Intelligence 15 IOCs YARA 13 File information Comments

SHA256 hash: a315e8d73a20a30705e91ff66461435df5a0b5482b093ae61cf48654bf433bac
SHA3-384 hash: 405a577df9e2380268343ad784290118e89ebd81aba7e76ccb14ca2e8cb3ad8d4c58cbb4589540e316596d84f6d6631b
SHA1 hash: ab237bc2bb6a41f89ec6ffa174c4a94d18d8ffe5
MD5 hash: 75ec9f51c6240e28a646827081b6e199
humanhash: earth-california-green-fruit
File name:75ec9f51c6240e28a646827081b6e199.exe
Download: download sample
Signature LummaStealer
File size:1'296'896 bytes
First seen:2023-12-10 21:45:17 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader)
ssdeep 24576:oyD2FN83/AIHd48VCKIWb14zGzM+kyXhEMBf3bj1/Tjus6GZ6a:vD2FgLlWWb14zGzlhEMZbjpjusz6
Threatray 810 similar samples on MalwareBazaar
TLSH T13F552316BFECA233DDB0277058F3168B0B39BD72586987AB579598A61C73B844437323
TrID 41.1% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
22.2% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
11.8% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
7.5% (.EXE) Win64 Executable (generic) (10523/12/4)
4.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
File icon (PE):PE icon
dhash icon f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader)
Reporter abuse_ch
Tags:exe LummaStealer


Avatar
abuse_ch
LummaStealer C2:
http://castlesideopwas.pw/api

Intelligence


File Origin
# of uploads :
1
# of downloads :
327
Origin country :
NL NL
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Creating a file in the Windows subdirectories
Сreating synchronization primitives
Modifying a system file
Creating a file
Replacing files
Launching a process
Launching a service
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Reading critical registry keys
Sending a UDP request
Forced system process termination
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Searching for the window
Blocking the Windows Defender launch
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Sending a TCP request to an infection source
Stealing user critical data
Adding exclusions to Windows Defender
Enabling autorun by creating a file
Gathering data
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
91%
Tags:
advpack anti-vm autoit CAB control explorer greyware installer installer keylogger lolbin packed rundll32 setupapi sfx shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Glupteba, PrivateLoader, RedLine, RisePr
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
Adds extensions / path to Windows Defender exclusion list (Registry)
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject threads in other processes
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender real time protection (registry)
Disables Windows Defender (deletes autostart)
Exclude list of file types from scheduled, custom, and real-time scanning
Found malware configuration
Found stalling execution ending in API Sleep call
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies Group Policy settings
PE file has a writeable .text section
Sample uses process hollowing technique
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
UAC bypass detected (Fodhelper)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Glupteba
Yara detected PrivateLoader
Yara detected RedLine Stealer
Yara detected RisePro Stealer
Yara detected SmokeLoader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1357806 Sample: vpljIpXIMw.exe Startdate: 10/12/2023 Architecture: WINDOWS Score: 100 111 ipinfo.io 2->111 133 Snort IDS alert for network traffic 2->133 135 Found malware configuration 2->135 137 Malicious sample detected (through community Yara rule) 2->137 139 13 other signatures 2->139 11 vpljIpXIMw.exe 1 4 2->11         started        15 OfficeTrackerNMP131.exe 10 501 2->15         started        17 OfficeTrackerNMP131.exe 2->17         started        19 11 other processes 2->19 signatures3 process4 file5 97 C:\Users\user\AppData\Local\...\wV5Hh95.exe, PE32 11->97 dropped 99 C:\Users\user\AppData\Local\...\6eZ7aa4.exe, PE32 11->99 dropped 171 Binary is likely a compiled AutoIt script file 11->171 21 wV5Hh95.exe 1 4 11->21         started        173 Antivirus detection for dropped file 15->173 175 Tries to steal Mail credentials (via file / registry access) 15->175 177 Machine Learning detection for dropped file 15->177 185 4 other signatures 15->185 25 WerFault.exe 15->25         started        101 C:\...\4a5WRb0TQiWb3aUZbS5measaD3aE60tE.zip, Zip 17->101 dropped 179 Disables Windows Defender (deletes autostart) 17->179 181 Tries to harvest and steal browser information (history, passwords, etc) 17->181 183 Exclude list of file types from scheduled, custom, and real-time scanning 17->183 27 WerFault.exe 17->27         started        29 WerFault.exe 19->29         started        31 WerFault.exe 19->31         started        33 WerFault.exe 19->33         started        signatures6 process7 file8 75 C:\Users\user\AppData\Local\...\4AY630fy.exe, PE32 21->75 dropped 77 C:\Users\user\AppData\Local\...\1TS14vj2.exe, PE32 21->77 dropped 157 Antivirus detection for dropped file 21->157 159 Machine Learning detection for dropped file 21->159 35 4AY630fy.exe 21->35         started        38 1TS14vj2.exe 11 508 21->38         started        signatures9 process10 dnsIp11 141 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 35->141 143 Maps a DLL or memory area into another process 35->143 145 Checks if the current machine is a virtual machine (disk enumeration) 35->145 147 Creates a thread in another existing process (thread injection) 35->147 42 explorer.exe 35->42 injected 113 193.233.132.51, 49708, 49709, 49710 FREE-NET-ASFREEnetEU Russian Federation 38->113 115 ipinfo.io 34.117.59.81, 443, 49711, 49712 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 38->115 89 C:\Users\user\AppData\...\FANBooster131.exe, PE32 38->89 dropped 91 C:\Users\user\AppData\...\MaxLoonaFest131.exe, PE32 38->91 dropped 93 C:\ProgramData\...\OfficeTrackerNMP131.exe, PE32 38->93 dropped 95 2 other malicious files 38->95 dropped 149 Tries to steal Mail credentials (via file / registry access) 38->149 151 Found stalling execution ending in API Sleep call 38->151 153 Disables Windows Defender (deletes autostart) 38->153 155 6 other signatures 38->155 47 schtasks.exe 1 38->47         started        49 schtasks.exe 1 38->49         started        51 WerFault.exe 38->51         started        file12 signatures13 process14 dnsIp15 117 185.172.128.19, 49736, 80 NADYMSS-ASRU Russian Federation 42->117 119 81.19.131.34, 49735, 80 IVC-ASRU Russian Federation 42->119 103 C:\Users\user\AppData\Local\TempE8.exe, PE32 42->103 dropped 105 C:\Users\user\AppData\Local\Temp\DA5A.exe, PE32 42->105 dropped 107 C:\Users\user\AppData\Local\Temp\66C1.exe, PE32 42->107 dropped 109 3 other malicious files 42->109 dropped 187 System process connects to network (likely due to code injection or exploit) 42->187 189 Benign windows process drops PE files 42->189 53 EE8.exe 42->53         started        57 1D8F.exe 42->57         started        59 DA5A.exe 42->59         started        61 conhost.exe 47->61         started        63 conhost.exe 49->63         started        file16 signatures17 process18 file19 79 C:\Users\user\AppData\Local\Temp\tuc3.exe, PE32 53->79 dropped 81 C:\Users\user\AppData\Local\...\toolspub2.exe, PE32 53->81 dropped 83 C:\Users\user\AppData\Local\...\latestX.exe, PE32+ 53->83 dropped 85 2 other malicious files 53->85 dropped 161 Antivirus detection for dropped file 53->161 163 Machine Learning detection for dropped file 53->163 65 31839b57a4f11171d6abc8bbc4451ee4.exe 53->65         started        68 toolspub2.exe 53->68         started        70 InstallSetup9.exe 53->70         started        73 InstallSetup9.exe 53->73         started        165 Writes to foreign memory regions 57->165 167 Allocates memory in foreign processes 57->167 169 Injects a PE file into a foreign processes 57->169 signatures20 process21 file22 121 Antivirus detection for dropped file 65->121 123 Detected unpacking (changes PE section rights) 65->123 125 Detected unpacking (overwrites its own PE header) 65->125 131 2 other signatures 65->131 127 Sample uses process hollowing technique 68->127 129 Injects a PE file into a foreign processes 68->129 87 C:\Users\user\AppData\Local\Temp\Broom.exe, PE32 70->87 dropped signatures23
Threat name:
Win32.Trojan.RisePro
Status:
Malicious
First seen:
2023-12-11 00:01:34 UTC
AV detection:
19 of 23 (82.61%)
Threat level:
  5/5
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:eternity family:glupteba family:privateloader family:redline family:risepro family:smokeloader botnet:@oleh_ps botnet:livetraffic botnet:up3 backdoor brand:google brand:paypal collection discovery dropper infostealer loader persistence phishing spyware stealer trojan
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Creates scheduled task(s)
Enumerates system info in registry
Modifies Internet Explorer settings
Runs net.exe
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Program crash
AutoIT Executable
Detected potential entity reuse from brand paypal.
Drops file in System32 directory
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Looks up external IP address via web service
Drops startup file
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Downloads MZ/PE file
Detected google phishing page
Eternity
Glupteba
Glupteba payload
PrivateLoader
RedLine
RedLine payload
RisePro
SmokeLoader
Malware Config
C2 Extraction:
193.233.132.51
http://81.19.131.34/fks/index.php
77.105.132.87:6731
176.123.7.190:32927
http://host-file-host6.com/
http://host-host-file8.com/
Unpacked files
SH256 hash:
a32894c37596187f3e15362b646793d3855378124db4580f8f6fa1c5baa18380
MD5 hash:
5863395d78fd5abdc15cc2216fa25c4d
SHA1 hash:
a6d04812536d25aa02e5f0ec5618c8a49f7ee6eb
Detections:
win_smokeloader_a2
SH256 hash:
fc3e7e13b86b49af3b45bbba34e58a2167715a33f0eade6020c7c55663aea34b
MD5 hash:
36930c536c2a81c68839a4f0a02e683c
SHA1 hash:
87afbc08b78894bf5e7ded12b5ae0eba2e6ea86c
SH256 hash:
f5ee614ae3f48b872eb41a10b1f4e70920e3b6a0880d9b164082ab34c36a485b
MD5 hash:
eefeac084e594faf0891ff2800ca05b1
SHA1 hash:
b2929ca5c2ee3d4db90936343726a77cabf9e050
Detections:
AutoIT_Compiled
SH256 hash:
a315e8d73a20a30705e91ff66461435df5a0b5482b093ae61cf48654bf433bac
MD5 hash:
75ec9f51c6240e28a646827081b6e199
SHA1 hash:
ab237bc2bb6a41f89ec6ffa174c4a94d18d8ffe5
Detections:
win_redline_wextract_hunting_oct_2023
Malware family:
PrivateLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:Check_Debugger
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__RemoteAPI
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:detect_Redline_Stealer
Author:Varp0s
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:QbotStuff
Author:anonymous
Rule name:SUSP_OneNote
Author:spatronn
Description:Hard-Detect One
Rule name:win_redline_wextract_hunting_oct_2023
Author:Matthew @ Embee_Research
Description:Detects wextract archives related to redline/amadey

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

LummaStealer

Executable exe a315e8d73a20a30705e91ff66461435df5a0b5482b093ae61cf48654bf433bac

(this sample)

  
Delivery method
Distributed via web download

Comments