MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b57280ff29b1bae4436d9f87cb929b1507831d2c91021945da5a66a001f58dfd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LummaStealer


Vendor detections: 16


Intelligence 16 IOCs YARA 2 File information Comments

SHA256 hash: b57280ff29b1bae4436d9f87cb929b1507831d2c91021945da5a66a001f58dfd
SHA3-384 hash: 329d675ffb691038524ff52f3a163ddf4ca84f8191d4cbaa4f4f0e3c2446a321afd4963ca3b7f0333b9d9f026ad2d835
SHA1 hash: d545971a44c2615f6e93e1e77fddd950a6ee773c
MD5 hash: c096091896176545bc3aac5adb5f7aad
humanhash: low-triple-lion-seven
File name:file
Download: download sample
Signature LummaStealer
File size:7'584'723 bytes
First seen:2024-08-10 09:53:28 UTC
Last seen:2024-08-10 16:41:06 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash b5a014d7eeb4c2042897567e1288a095 (21 x HijackLoader, 14 x ValleyRAT, 12 x LummaStealer)
ssdeep 196608:PpyjvqOnGGXy+jPww/99k2xLjrvWAeD6HKM9wG:Pp09nGGt8w/99xxLj3eD6rwG
TLSH T120763324B394C5E0C1A4CE32DF99976192B2F3BA72DE5FE7669A4F214D43423871B4C2
TrID 38.7% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
24.6% (.EXE) Win64 Executable (generic) (10523/12/4)
11.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
10.5% (.EXE) Win32 Executable (generic) (4504/4/1)
4.7% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon c292ecd8f2f6fe1c (15 x HijackLoader, 11 x LummaStealer, 7 x Arechclient2)
Reporter Bitsight
Tags:exe LummaStealer


Avatar
Bitsight
url: http://147.45.44.104/prog/66b72acef0ad2_7ainstall.exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
374
Origin country :
US US
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2024-08-10 09:53:58 UTC
Tags:
lumma stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
97.4%
Tags:
Encryption Network Static Stealth Trojan
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
epmicrosoft_visual_cc fingerprint installer lolbin microsoft_visual_cc overlay packed shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
92 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Found malware configuration
LummaC encrypted strings found
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Sample uses string decryption to hide its real strings
Yara detected LummaC Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Spyware.Lummastealer
Status:
Malicious
First seen:
2024-08-10 09:54:14 UTC
File Type:
PE (Exe)
Extracted files:
118
AV detection:
15 of 24 (62.50%)
Threat level:
  2/5
Verdict:
malicious
Result
Malware family:
Score:
  10/10
Tags:
family:lumma discovery stealer
Behaviour
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Lumma Stealer, LummaC
Malware Config
C2 Extraction:
https://tenntysjuxmz.shop/api
Unpacked files
SH256 hash:
325544dd0ea7b7be9dc9cd4accc26b11987c5fad9eb9eae3384ea6b529aba1b0
MD5 hash:
a06ab134159c902d94196c6e4f13c811
SHA1 hash:
1d8714512343a44abc02c3672e3b2df142a525d2
Detections:
LummaStealer
SH256 hash:
c2ad5bd189df04b39be18dec5cd251cf79b066010706ad26d99df7e49fd07762
MD5 hash:
9e82e3b658393bed3f7e4f090df1fbe7
SHA1 hash:
bfff954b8ef192c01af9fb5d9141a21279cb9c31
SH256 hash:
7fa86147035627bae39576bcbe619d045e94a48c4db8ca131968c20bb4de4a36
MD5 hash:
14934caca84d5fe0288f27efb31dcbf8
SHA1 hash:
98c8c659488a5782679112e0ffb089422a664ac5
SH256 hash:
009d69379314ed1db8f8d9c717ce2cef800072c6990ca4e1d3eafdedcad8156b
MD5 hash:
b3908f5dc71ad4b2f8d9f3fb3f7b4baa
SHA1 hash:
e3fe5e197ffeda0efd2cdb8c0dcaff6dffd6da5c
SH256 hash:
635038fd14af0f552cbb36ce4509d9979bbf79f81a216336c639bed6a0d89e24
MD5 hash:
77d9c947307ff881ddb55bc9d6dd1d2a
SHA1 hash:
f8797d4796017de7053326bb74ae23c33786c025
SH256 hash:
b57280ff29b1bae4436d9f87cb929b1507831d2c91021945da5a66a001f58dfd
MD5 hash:
c096091896176545bc3aac5adb5f7aad
SHA1 hash:
d545971a44c2615f6e93e1e77fddd950a6ee773c
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

LummaStealer

Executable exe b57280ff29b1bae4436d9f87cb929b1507831d2c91021945da5a66a001f58dfd

(this sample)

  
Dropped by
Privateloader
  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
COM_BASE_APICan Download & Execute componentsole32.dll::CoCreateInstance
ole32.dll::CreateStreamOnHGlobal
SHELL_APIManipulates System ShellSHELL32.dll::ShellExecuteExW
SHELL32.dll::ShellExecuteW
SHELL32.dll::SHGetFileInfoW
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CloseHandle
KERNEL32.dll::CreateThread
WIN_BASE_APIUses Win Base APIKERNEL32.dll::LoadLibraryA
KERNEL32.dll::GetDriveTypeW
KERNEL32.dll::GetStartupInfoA
KERNEL32.dll::GetDiskFreeSpaceExW
KERNEL32.dll::GetCommandLineW
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateDirectoryW
KERNEL32.dll::CreateFileW
KERNEL32.dll::DeleteFileW
KERNEL32.dll::GetSystemDirectoryW
KERNEL32.dll::GetFileAttributesW
KERNEL32.dll::FindFirstFileW
WIN_USER_APIPerforms GUI ActionsUSER32.dll::CreateWindowExW

Comments