MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 c92353fc93904cff5198ccddebdd3381d94a9a4f05e8256cd96fd4c3b00bddcf. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
LummaStealer
Vendor detections: 14
| SHA256 hash: | c92353fc93904cff5198ccddebdd3381d94a9a4f05e8256cd96fd4c3b00bddcf |
|---|---|
| SHA3-384 hash: | 9b11dfcbd9cf972dfe13c39f0790e6e03897d7f9a4bd69116e55d59752a8c75675bc584639f5ae6a8d89813b8b2fe167 |
| SHA1 hash: | 8aff850c4b1972e8723575b7c97f6bb07fc5ccb0 |
| MD5 hash: | 9ce01fdabd737268e2c5fe3da55fc969 |
| humanhash: | william-helium-twelve-arizona |
| File name: | 9ce01fdabd737268e2c5fe3da55fc969.exe |
| Download: | download sample |
| Signature | LummaStealer |
| File size: | 2'023'936 bytes |
| First seen: | 2023-11-29 01:50:22 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader) |
| ssdeep | 49152:lFDC5JswTjssfS9eLjYNEDbB+56vv6XrCuZFJYrM95WPCXZF4igcg/A80:TwTrfS9eHzcfrz95WEZF41cg/ |
| Threatray | 283 similar samples on MalwareBazaar |
| TLSH | T1289533A2A3E9C031D6B5677448BA59630F32BDA1F6B483D3A7529D494C122D0F67233F |
| TrID | 41.1% (.CPL) Windows Control Panel Item (generic) (57583/11/19) 22.2% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 11.8% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 7.5% (.EXE) Win64 Executable (generic) (10523/12/4) 4.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) |
| File icon (PE): | |
| dhash icon | f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader) |
| Reporter | |
| Tags: | exe LummaStealer |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | detect_Redline_Stealer |
|---|---|
| Author: | Varp0s |
| Rule name: | INDICATOR_EXE_Packed_ConfuserEx |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables packed with ConfuserEx Mod |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | win_redline_wextract_hunting_oct_2023 |
|---|---|
| Author: | Matthew @ Embee_Research |
| Description: | Detects wextract archives related to redline/amadey |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.