MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c2af3e3e623297ec90c6c5afea6b0ee2107697e9c0bdd370f5ecd615c68b4115. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LummaStealer


Vendor detections: 15


Intelligence 15 IOCs YARA 7 File information Comments

SHA256 hash: c2af3e3e623297ec90c6c5afea6b0ee2107697e9c0bdd370f5ecd615c68b4115
SHA3-384 hash: dcabb045b10c64c02e7f11e756d8116949a4398101adb40a875db5621e932c0b88671aba12bc4bc1445dc0965dc00a7d
SHA1 hash: 3067c934fd623e01537299735ab56e4831cbd224
MD5 hash: b83877f76dfaea75355ccc2ccae94201
humanhash: fish-fruit-single-seventeen
File name:b83877f76dfaea75355ccc2ccae94201.exe
Download: download sample
Signature LummaStealer
File size:1'771'008 bytes
First seen:2023-11-26 21:25:11 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader)
ssdeep 49152:TUcqeGrQsSKZRPeiu9RIRODqE4KjjguSPbi4N:zKrCKZJhhE4KvUDN
Threatray 177 similar samples on MalwareBazaar
TLSH T1E4853382B3ED8062D5F92F7444F66BA31A347DD5E960E7222315E54D6CA3E24F07232B
TrID 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60)
11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
3.7% (.EXE) Win64 Executable (generic) (10523/12/4)
2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
File icon (PE):PE icon
dhash icon f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader)
Reporter abuse_ch
Tags:exe LummaStealer


Avatar
abuse_ch
LummaStealer C2:
91.92.249.95:7124

Intelligence


File Origin
# of uploads :
1
# of downloads :
360
Origin country :
NL NL
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Creating a file
Launching a process
Sending a custom TCP request
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Enabling autorun by creating a file
Gathering data
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
advpack anti-vm CAB control explorer greyware installer installer lolbin lolbin mokes packed rundll32 setupapi sfx shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
PrivateLoader, RedLine, RisePro Stealer,
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Contains functionality to check for running processes (XOR)
Contains functionality to inject threads in other processes
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found stalling execution ending in API Sleep call
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
PE file has a writeable .text section
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected PrivateLoader
Yara detected RedLine Stealer
Yara detected RisePro Stealer
Yara detected SmokeLoader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1348176 Sample: w27hLuN221.exe Startdate: 26/11/2023 Architecture: WINDOWS Score: 100 81 ipinfo.io 2->81 109 Snort IDS alert for network traffic 2->109 111 Found malware configuration 2->111 113 Antivirus detection for URL or domain 2->113 115 13 other signatures 2->115 12 w27hLuN221.exe 1 4 2->12         started        15 OfficeTrackerNMP131.exe 501 2->15         started        19 OfficeTrackerNMP131.exe 2->19         started        21 7 other processes 2->21 signatures3 process4 dnsIp5 73 C:\Users\user\AppData\Local\...\jt4zd21.exe, PE32 12->73 dropped 75 C:\Users\user\AppData\Local\...\5iM8KK3.exe, PE32 12->75 dropped 23 jt4zd21.exe 1 4 12->23         started        85 ipinfo.io 34.117.59.81, 443, 49732, 49733 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 15->85 87 Multi AV Scanner detection for dropped file 15->87 89 Contains functionality to check for running processes (XOR) 15->89 91 Tries to steal Mail credentials (via file / registry access) 15->91 97 2 other signatures 15->97 27 WerFault.exe 15->27         started        93 Tries to harvest and steal browser information (history, passwords, etc) 19->93 95 Machine Learning detection for dropped file 21->95 file6 signatures7 process8 file9 69 C:\Users\user\AppData\Local\...\hf0aN78.exe, PE32 23->69 dropped 71 C:\Users\user\AppData\Local\...\4QL631yt.exe, PE32 23->71 dropped 131 Antivirus detection for dropped file 23->131 133 Binary is likely a compiled AutoIt script file 23->133 135 Machine Learning detection for dropped file 23->135 29 hf0aN78.exe 1 4 23->29         started        signatures10 process11 file12 77 C:\Users\user\AppData\Local\...\pS9xr67.exe, PE32 29->77 dropped 79 C:\Users\user\AppData\Local\...\3Ye35Va.exe, PE32 29->79 dropped 137 Antivirus detection for dropped file 29->137 139 Multi AV Scanner detection for dropped file 29->139 141 Machine Learning detection for dropped file 29->141 33 pS9xr67.exe 1 4 29->33         started        signatures13 process14 file15 59 C:\Users\user\AppData\Local\...\2zD3250.exe, PE32 33->59 dropped 61 C:\Users\user\AppData\Local\...\1gZ39cJ2.exe, PE32 33->61 dropped 99 Machine Learning detection for dropped file 33->99 37 1gZ39cJ2.exe 1 503 33->37         started        42 2zD3250.exe 33->42         started        signatures16 process17 dnsIp18 83 194.49.94.152, 19053, 49729, 49730 EQUEST-ASNL unknown 37->83 63 C:\Users\user\AppData\...\FANBooster131.exe, PE32 37->63 dropped 65 C:\Users\user\AppData\...\MaxLoonaFest131.exe, PE32 37->65 dropped 67 C:\ProgramData\...\OfficeTrackerNMP131.exe, PE32 37->67 dropped 117 Multi AV Scanner detection for dropped file 37->117 119 Contains functionality to check for running processes (XOR) 37->119 121 Tries to steal Mail credentials (via file / registry access) 37->121 129 6 other signatures 37->129 44 schtasks.exe 1 37->44         started        46 schtasks.exe 1 37->46         started        48 WerFault.exe 37->48         started        123 Writes to foreign memory regions 42->123 125 Allocates memory in foreign processes 42->125 127 Injects a PE file into a foreign processes 42->127 50 AppLaunch.exe 42->50         started        53 conhost.exe 42->53         started        file19 signatures20 process21 signatures22 55 conhost.exe 44->55         started        57 conhost.exe 46->57         started        101 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 50->101 103 Found many strings related to Crypto-Wallets (likely being stolen) 50->103 105 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 50->105 107 Tries to harvest and steal browser information (history, passwords, etc) 50->107 process23
Threat name:
Win32.Trojan.RiseProStealer
Status:
Malicious
First seen:
2023-11-26 21:26:05 UTC
File Type:
PE (Exe)
Extracted files:
175
AV detection:
18 of 23 (78.26%)
Threat level:
  5/5
Result
Malware family:
risepro
Score:
  10/10
Tags:
family:privateloader family:risepro loader persistence stealer
Behaviour
Creates scheduled task(s)
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Adds Run key to start application
Drops startup file
Executes dropped EXE
PrivateLoader
RisePro
Malware Config
C2 Extraction:
194.49.94.152
Unpacked files
SH256 hash:
543c802cb858aa2ecfcf7ff9b3821b4182c44cea73927305be7b20a5388f8f76
MD5 hash:
5283d461140a20a9eacea02145c4ec16
SHA1 hash:
8189ce57c7df0cc1d94e066c0ebacd3f104ce824
SH256 hash:
c8e304bd1296d4ebd7339003865723acc46815b2e2a6d2a64469cd2567a27a88
MD5 hash:
466c12d092755c3437dafae4515d949d
SHA1 hash:
5d754c701f612fb20d436e2a87ee1a675a41df0f
SH256 hash:
c2af3e3e623297ec90c6c5afea6b0ee2107697e9c0bdd370f5ecd615c68b4115
MD5 hash:
b83877f76dfaea75355ccc2ccae94201
SHA1 hash:
3067c934fd623e01537299735ab56e4831cbd224
Detections:
win_redline_wextract_hunting_oct_2023
Malware family:
PrivateLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:detect_Redline_Stealer
Author:Varp0s
Rule name:INDICATOR_EXE_Packed_ConfuserEx
Author:ditekSHen
Description:Detects executables packed with ConfuserEx Mod
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:win_redline_wextract_hunting_oct_2023
Author:Matthew @ Embee_Research
Description:Detects wextract archives related to redline/amadey

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

LummaStealer

Executable exe c2af3e3e623297ec90c6c5afea6b0ee2107697e9c0bdd370f5ecd615c68b4115

(this sample)

  
Delivery method
Distributed via web download

Comments