MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 bb51422c11080e388fbb7dc7a7bfdb6cc01235d8ccb65fbbf726c230db357be6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LummaStealer


Vendor detections: 11


Intelligence 11 IOCs YARA 10 File information Comments

SHA256 hash: bb51422c11080e388fbb7dc7a7bfdb6cc01235d8ccb65fbbf726c230db357be6
SHA3-384 hash: 6eee99978b6400104608e374df63018786054833a55a0c04dcc4cee2da41eaf9bf9d480e665f03ba784e606900bb4b94
SHA1 hash: ddc8bf9c2577eb31d51bedb80ea073143b4e5081
MD5 hash: 9d9c7f57036ac510aaf87baed41ec50e
humanhash: papa-carolina-october-friend
File name:bb51422c11080e388fbb7dc7a7bfdb6cc01235d8ccb65fbbf726c230db357be6
Download: download sample
Signature LummaStealer
File size:15'521'112 bytes
First seen:2023-09-05 11:08:27 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 21314122cd4542a6b9b297f52a87acbe (3 x GuLoader, 2 x LummaStealer, 2 x ConnectWise)
ssdeep 393216:bRYsAKBfMEOSiBNz1eYNpzdzYN5/8b/qc5VLO5WvGGf0:9YsA+MHS2egYN1Wqc5VLEss
Threatray 6 similar samples on MalwareBazaar
TLSH T159F6C021758AC53BE66711716A3DDAAB51697EB10BB254CBB3CC3E7E0B704C21232E17
TrID 54.3% (.CPL) Windows Control Panel Item (generic) (197083/11/60)
32.1% (.OCX) Windows ActiveX control (116521/4/18)
4.5% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
2.9% (.EXE) Win64 Executable (generic) (10523/12/4)
1.8% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
File icon (PE):PE icon
dhash icon f0ccb4d4d4b48cf0 (1 x LummaStealer)
Reporter adrian__luca
Tags:exe LummaStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
296
Origin country :
HU HU
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Setup.exe
Verdict:
Malicious activity
Analysis date:
2023-08-25 13:02:19 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Сreating synchronization primitives
Searching for the window
Creating a file in the %AppData% subdirectories
Searching for synchronization primitives
Sending an HTTP GET request
Creating a file in the %temp% directory
Launching a process
Modifying a system file
Creating a file in the Windows subdirectories
Creating a process from a recently created file
Launching cmd.exe command interpreter
Unauthorized injection to a system process
Gathering data
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm control evasive fingerprint greyware lolbin msiexec overlay packed remote setupapi shell32
Result
Verdict:
MALICIOUS
Result
Threat name:
LummaC Stealer
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Drops executables to the windows directory (C:\Windows) and starts them
Found hidden mapped module (file has been removed from disk)
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Writes to foreign memory regions
Yara detected LummaC Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1303456 Sample: 1XkYsV7vFx.exe Startdate: 05/09/2023 Architecture: WINDOWS Score: 100 61 Antivirus detection for dropped file 2->61 63 Antivirus / Scanner detection for submitted sample 2->63 65 Multi AV Scanner detection for dropped file 2->65 67 3 other signatures 2->67 9 msiexec.exe 41 66 2->9         started        13 QQPlayerShareFile.exe 36 2->13         started        15 1XkYsV7vFx.exe 25 2->15         started        process3 dnsIp4 39 C:\Windows\Installer\MSI81D1.tmp, PE32 9->39 dropped 41 C:\Windows\Installer\MSI74FC.tmp, PE32 9->41 dropped 43 C:\Windows\Installer\MSI749D.tmp, PE32 9->43 dropped 51 35 other files (32 malicious) 9->51 dropped 71 Drops executables to the windows directory (C:\Windows) and starts them 9->71 18 msiexec.exe 1 9->18         started        20 msiexec.exe 9->20         started        22 MSI81D1.tmp 9->22         started        45 C:\Users\user\AppData\Roaming\...\zlib.dll, PE32 13->45 dropped 47 C:\Users\user\AppData\...\xGraphic32.dll, PE32 13->47 dropped 49 C:\Users\user\AppData\Roaming\...\tinyxml.dll, PE32 13->49 dropped 53 27 other files (24 malicious) 13->53 dropped 24 QQPlayerShareFile.exe 5 13->24         started        59 192.168.2.1 unknown unknown 15->59 55 5 other malicious files 15->55 dropped 27 msiexec.exe 2 15->27         started        file5 signatures6 process7 signatures8 69 Maps a DLL or memory area into another process 24->69 29 cmd.exe 2 24->29         started        process9 file10 57 C:\Users\user\AppData\Local\Temp\lbktv, PE32 29->57 dropped 73 Injects code into the Windows Explorer (explorer.exe) 29->73 75 Writes to foreign memory regions 29->75 77 Found hidden mapped module (file has been removed from disk) 29->77 79 Maps a DLL or memory area into another process 29->79 33 explorer.exe 29->33         started        35 conhost.exe 29->35         started        signatures11 process12 process13 37 WerFault.exe 3 10 33->37         started       
Threat name:
Win32.Spyware.Lummastealer
Status:
Malicious
First seen:
2023-08-25 07:56:38 UTC
AV detection:
14 of 24 (58.33%)
Threat level:
  2/5
Result
Malware family:
Score:
  10/10
Tags:
family:amadey family:lumma evasion spyware stealer trojan vmprotect
Behaviour
Creates scheduled task(s)
Delays execution with timeout.exe
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Windows directory
Drops file in System32 directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks whether UAC is enabled
Enumerates connected drives
Checks BIOS information in registry
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
VMProtect packed file
Blocklisted process makes network request
Downloads MZ/PE file
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Amadey
Lumma Stealer
Malware Config
C2 Extraction:
45.9.74.5/b7djSDcPcZ/index.php
Unpacked files
SH256 hash:
115a6f0b247d4a5e8183164bfb7922d74f831861e6c099a31bf60cc630bbb548
MD5 hash:
a7d89a2e3af0033a149928d0071258c6
SHA1 hash:
bae670aeaf5e2e91771c3c0a7fa45ebda97ad908
SH256 hash:
bb51422c11080e388fbb7dc7a7bfdb6cc01235d8ccb65fbbf726c230db357be6
MD5 hash:
9d9c7f57036ac510aaf87baed41ec50e
SHA1 hash:
ddc8bf9c2577eb31d51bedb80ea073143b4e5081
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:APT_Sandworm_ArguePatch_Apr_2022_1
Author:Arkbird_SOLG
Description:Detect ArguePatch loader used by Sandworm group for load CaddyWiper
Reference:https://www.welivesecurity.com/2022/04/12/industroyer2-industroyer-reloaded/
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:maldoc_OLE_file_magic_number
Author:Didier Stevens (https://DidierStevens.com)
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:NET
Author:malware-lu
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits
Rule name:suspicious_msi_file
Author:Johnk3r
Description:Detects common strings, DLL and API in Banker_BR

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments