MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 bcec8f25d0fcce6b453b9bc363d15b3fa84f2bca0afc7c5bb9f3620386b4dabc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LummaStealer


Vendor detections: 12


Intelligence 12 IOCs YARA 21 File information Comments

SHA256 hash: bcec8f25d0fcce6b453b9bc363d15b3fa84f2bca0afc7c5bb9f3620386b4dabc
SHA3-384 hash: 6119d7e3879d3a27691543b0e4005fc40b6be9fb630fb699b6f00374a7499ce808a17532dca0eeaa5f3d40410699b144
SHA1 hash: bb52f7bfa7d627b84bbf332e962393ef3829b681
MD5 hash: 0f3a1dd12b96fd6d5d1d2dc599659059
humanhash: kitten-virginia-sweet-magazine
File name:bcec8f25d0fcce6b453b9bc363d15b3fa84f2bca0afc7c5bb9f3620386b4dabc.exe
Download: download sample
Signature LummaStealer
File size:2'475'520 bytes
First seen:2024-01-02 18:56:59 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader)
ssdeep 49152:GsSoYo52RhV51Qg/uahtHnwShPk/TGN3A8hwyATPmyntyuUf:K85G31Qg/u2t1crNq9q3tyuQ
Threatray 3'113 similar samples on MalwareBazaar
TLSH T1ACB533426AE54570C9B51BB0A4FB53C75E35BEB3AA64570F3A80EB8408B38E1B13573D
TrID 41.1% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
22.2% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
11.8% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
7.5% (.EXE) Win64 Executable (generic) (10523/12/4)
4.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
File icon (PE):PE icon
dhash icon f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader)
Reporter adm1n_usa32
Tags:exe LummaStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
291
Origin country :
RO RO
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Creating a window
Launching a process
Sending a custom TCP request
Сreating synchronization primitives
Searching for the browser window
Searching for the window
DNS request
Reading critical registry keys
Running batch commands
Blocking the Windows Defender launch
Adding an exclusion to Microsoft Defender
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
advpack anti-vm azorult CAB control explorer installer lolbin lolbin packed risepro rundll32 setupapi sfx shell32 smokeloader
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RisePro Stealer, Vidar
Detection:
malicious
Classification:
phis.troj.spyw.expl.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Binary is likely a compiled AutoIt script file
Contains functionality to modify clipboard data
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Found API chain indicative of sandbox detection
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies Windows Defender protection settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has nameless sections
Phishing site detected (based on logo match)
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Snort IDS alert for network traffic
Suspicious execution chain found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
Yara detected RisePro Stealer
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1368929 Sample: KrECikgTB2.exe Startdate: 02/01/2024 Architecture: WINDOWS Score: 100 126 www.google.com 2->126 128 ipinfo.io 2->128 140 Snort IDS alert for network traffic 2->140 142 Antivirus detection for URL or domain 2->142 144 Antivirus detection for dropped file 2->144 146 11 other signatures 2->146 10 KrECikgTB2.exe 1 4 2->10         started        13 MaxLoonaFest131.exe 2->13         started        16 FANBooster131.exe 2->16         started        18 5 other processes 2->18 signatures3 process4 file5 104 C:\Users\user\AppData\Local\...\vZ0NP90.exe, PE32 10->104 dropped 106 C:\Users\user\AppData\Local\...\6Ti9aW7.exe, PE32 10->106 dropped 20 vZ0NP90.exe 1 4 10->20         started        108 C:\Users\user\AppData\Local\...\sqlite3.dll, PE32 13->108 dropped 110 C:\...RDuCxRHDzO89qBMu0ThEkzLyo8gnf1M.zip, Zip 13->110 dropped 186 Antivirus detection for dropped file 13->186 188 Multi AV Scanner detection for dropped file 13->188 190 Detected unpacking (changes PE section rights) 13->190 206 3 other signatures 13->206 24 WerFault.exe 13->24         started        112 C:\Users\user\AppData\Local\...\sqlite3.dll, PE32 16->112 dropped 114 C:\...\APnPE2x5zs39xyyEhp4Nsk2Gwq8eYPhc.zip, Zip 16->114 dropped 192 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 16->192 194 Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines) 16->194 196 Tries to steal Mail credentials (via file / registry access) 16->196 198 Tries to harvest and steal browser information (history, passwords, etc) 16->198 26 WerFault.exe 16->26         started        116 C:\Users\user\AppData\Local\...\sqlite3.dll, PE32 18->116 dropped 118 C:\...\1sSznuNgZLgesAgtRcbJhGIFpK0UdtbV.zip, Zip 18->118 dropped 200 Machine Learning detection for dropped file 18->200 202 Modifies Windows Defender protection settings 18->202 204 Hides threads from debuggers 18->204 28 powershell.exe 18->28         started        30 powershell.exe 18->30         started        32 powershell.exe 18->32         started        34 22 other processes 18->34 signatures6 process7 file8 92 C:\Users\user\AppData\Local\...\5Qq2HF7.exe, PE32 20->92 dropped 94 C:\Users\user\AppData\Local\...\2ye3141.exe, PE32 20->94 dropped 148 Antivirus detection for dropped file 20->148 150 Multi AV Scanner detection for dropped file 20->150 152 Binary is likely a compiled AutoIt script file 20->152 154 Machine Learning detection for dropped file 20->154 36 5Qq2HF7.exe 21 41 20->36         started        41 2ye3141.exe 12 20->41         started        43 conhost.exe 28->43         started        45 conhost.exe 30->45         started        47 conhost.exe 32->47         started        49 conhost.exe 34->49         started        51 conhost.exe 34->51         started        53 conhost.exe 34->53         started        55 18 other processes 34->55 signatures9 process10 dnsIp11 130 193.233.132.62 FREE-NET-ASFREEnetEU Russian Federation 36->130 132 ipinfo.io 34.117.186.192 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 36->132 96 C:\Users\user\AppData\Local\...\sqlite3.dll, PE32 36->96 dropped 98 C:\Users\user\AppData\...\FANBooster131.exe, PE32 36->98 dropped 100 C:\Users\user\AppData\...\MaxLoonaFest131.exe, PE32 36->100 dropped 102 2 other malicious files 36->102 dropped 156 Antivirus detection for dropped file 36->156 158 Multi AV Scanner detection for dropped file 36->158 160 Detected unpacking (changes PE section rights) 36->160 170 9 other signatures 36->170 57 powershell.exe 36->57         started        60 cmd.exe 36->60         started        62 cmd.exe 36->62         started        71 12 other processes 36->71 162 Binary is likely a compiled AutoIt script file 41->162 164 Machine Learning detection for dropped file 41->164 166 Found API chain indicative of sandbox detection 41->166 168 Contains functionality to modify clipboard data 41->168 64 chrome.exe 9 41->64         started        67 chrome.exe 41->67         started        69 chrome.exe 41->69         started        file12 signatures13 process14 dnsIp15 172 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 57->172 174 Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines) 57->174 176 Found many strings related to Crypto-Wallets (likely being stolen) 57->176 184 2 other signatures 57->184 73 conhost.exe 57->73         started        178 Uses schtasks.exe or at.exe to add and modify task schedules 60->178 86 2 other processes 60->86 88 2 other processes 62->88 120 192.168.2.5 unknown unknown 64->120 122 192.168.2.10 unknown unknown 64->122 124 4 other IPs or domains 64->124 180 Modifies Windows Defender protection settings 64->180 182 Suspicious execution chain found 64->182 75 chrome.exe 64->75         started        78 chrome.exe 64->78         started        80 chrome.exe 64->80         started        82 chrome.exe 67->82         started        84 chrome.exe 69->84         started        90 11 other processes 71->90 signatures16 process17 dnsIp18 134 play.google.com 142.250.113.113 GOOGLEUS United States 75->134 136 www3.l.google.com 142.250.113.139 GOOGLEUS United States 75->136 138 42 other IPs or domains 75->138
Threat name:
Win32.Trojan.Smokeloader
Status:
Malicious
First seen:
2024-01-02 08:18:37 UTC
File Type:
PE (Exe)
Extracted files:
165
AV detection:
23 of 36 (63.89%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:lumma evasion persistence stealer trojan
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Creates scheduled task(s)
Enumerates system info in registry
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Enumerates physical storage devices
Program crash
AutoIT Executable
Suspicious use of NtSetInformationThreadHideFromDebugger
Adds Run key to start application
Drops startup file
Executes dropped EXE
Loads dropped DLL
Windows security modification
Detect Lumma Stealer payload V4
Lumma Stealer
Modifies Windows Defender Real-time Protection settings
Malware Config
C2 Extraction:
http://soupinterestoe.fun/api
Unpacked files
SH256 hash:
444d7129405299b8497fb51eabdd069e3abb2c08f34ec257b066d930b6d7a595
MD5 hash:
9568c64df96104c6b66aae307280e92d
SHA1 hash:
fc6aa15cbe56ba65c4bb00385afb74fc7905e4aa
Detections:
AutoIT_Compiled
SH256 hash:
bcec8f25d0fcce6b453b9bc363d15b3fa84f2bca0afc7c5bb9f3620386b4dabc
MD5 hash:
0f3a1dd12b96fd6d5d1d2dc599659059
SHA1 hash:
bb52f7bfa7d627b84bbf332e962393ef3829b681
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Borland
Author:malware-lu
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__RemoteAPI
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerHiding__Thread
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:detect_Redline_Stealer
Author:Varp0s
Rule name:EnigmaStub
Author:@bartblaze
Description:Identifies Enigma packer stub.
Rule name:INDICATOR_EXE_Packed_ConfuserEx
Author:ditekSHen
Description:Detects executables packed with ConfuserEx Mod
Rule name:maldoc_getEIP_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques
Rule name:win_redline_wextract_hunting_oct_2023
Author:Matthew @ Embee_Research
Description:Detects wextract archives related to redline/amadey

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments