MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a778f6cc3e8d33e55e0f2379ea5923a3314db424118bb9a7e0ba872a645e5bf9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LummaStealer


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments 1

SHA256 hash: a778f6cc3e8d33e55e0f2379ea5923a3314db424118bb9a7e0ba872a645e5bf9
SHA3-384 hash: a226b40379238d1d15e3bbd1b70238ea1f2fb5585e9f3cadc13b166dad98c5d84cfa40800b264954fcc481c59cd0d895
SHA1 hash: 70f73ed9cc8fe68e35af30c6285b48d076482618
MD5 hash: 3fdf01034335b7ce87b54883a3908621
humanhash: magnesium-east-item-kansas
File name:3fdf01034335b7ce87b54883a3908621
Download: download sample
Signature LummaStealer
File size:1'265'152 bytes
First seen:2023-02-19 12:38:12 UTC
Last seen:2023-02-19 14:27:29 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 4054baf204a5a03db5bb3059a75fe4c0 (1 x LummaStealer)
ssdeep 12288:ddcwwEKs4x8FLdLM/deTt5taNuPX66OZU:ddc7Etg8F3Tt5taMOZU
Threatray 304 similar samples on MalwareBazaar
TLSH T19B45D001B4C1C433C0B2153109F4E7BA5A7EB9600B6599FF67E41FAE4F703D196726AA
TrID 32.2% (.EXE) Win64 Executable (generic) (10523/12/4)
20.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
15.4% (.EXE) Win16 NE executable (generic) (5038/12/1)
13.7% (.EXE) Win32 Executable (generic) (4505/5/1)
6.2% (.EXE) OS/2 Executable (generic) (2029/13)
Reporter zbetcheckin
Tags:32 exe LummaStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
234
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
3fdf01034335b7ce87b54883a3908621
Verdict:
Malicious activity
Analysis date:
2023-02-19 12:40:49 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Launching a process
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Sending a custom TCP request
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
LummaC2 Stealer
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.spyw.evad
Score:
76 / 100
Signature
Allocates memory in foreign processes
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Tries to harvest and steal browser information (history, passwords, etc)
Uses known network protocols on non-standard ports
Writes to foreign memory regions
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Cryware
Status:
Malicious
First seen:
2023-02-18 01:25:14 UTC
File Type:
PE (Exe)
AV detection:
24 of 39 (61.54%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Unpacked files
SH256 hash:
a778f6cc3e8d33e55e0f2379ea5923a3314db424118bb9a7e0ba872a645e5bf9
MD5 hash:
3fdf01034335b7ce87b54883a3908621
SHA1 hash:
70f73ed9cc8fe68e35af30c6285b48d076482618
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

LummaStealer

Executable exe a778f6cc3e8d33e55e0f2379ea5923a3314db424118bb9a7e0ba872a645e5bf9

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2023-02-19 12:38:16 UTC

url : hxxp://h167471.srv11.test-hf.su/65.exe