MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d1c39c1a5bb19f5ba4ef36cedbd3ad1c8cafc83e658230c0efd77b105510bbae. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LummaStealer


Vendor detections: 4


Intelligence 4 IOCs YARA 2 File information Comments

SHA256 hash: d1c39c1a5bb19f5ba4ef36cedbd3ad1c8cafc83e658230c0efd77b105510bbae
SHA3-384 hash: 2105f64abf44f914ebcd53c46f5701b22504f957398fdd195df4a55141f492acf2a3dabd1f1066268c123a3a23eceab6
SHA1 hash: 15d24c50c7c41700b57673a85d82cf337a872648
MD5 hash: 089ba3f8c49e5c5656baa22951dadaa7
humanhash: robert-artist-seven-alaska
File name:OinkCrust.a3x
Download: download sample
Signature LummaStealer
File size:506'445 bytes
First seen:2024-08-19 15:34:56 UTC
Last seen:Never
File type:
MIME type:application/octet-stream
ssdeep 12288:xwv+qT6WF8QNG7gwavTWOWvemmIdjEnaHfQ0:xwvvT6DmG7gwSWOsBmIdj1t
TLSH T158B4AE2A6A7AAA7FED0BC519B50C0436E4CA743DD3DCFC02B847652588F29385D9DD0E
Reporter aachum
Tags:a3x LummaStealer


Avatar
iamaachum
Lumma C2:
https://wollfsoaisvz.shop/api
https://potentioallykeos.shop/api
https://interactiedovspm.shop/api
https://charecteristicdxp.shop/api
https://cagedwifedsozm.shop/api
https://deicedosmzj.shop/api
https://southedhiscuso.shop/api
https://consciousourwi.shop/api
https://tenntysjuxmz.shop/api

Intelligence


File Origin
# of uploads :
1
# of downloads :
92
Origin country :
ES ES
Vendor Threat Intelligence
Verdict:
Unknown
Threat level:
  2.5/10
Confidence:
100%
Tags:
masquerade obfuscated
Result
Verdict:
MALICIOUS
Threat name:
Binary.Trojan.Generic
Status:
Suspicious
First seen:
2024-08-19 15:50:06 UTC
File Type:
Binary
Extracted files:
2
AV detection:
4 of 24 (16.67%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AutoIT_Script
Author:@bartblaze
Description:Identifies AutoIT script. This rule by itself does NOT necessarily mean the detected file is malicious.
Rule name:SUSP_XORed_MSDOS_Stub_Message
Author:Florian Roth
Description:Detects suspicious XORed MSDOS stub message
Reference:https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

LummaStealer

d1c39c1a5bb19f5ba4ef36cedbd3ad1c8cafc83e658230c0efd77b105510bbae

(this sample)

Comments