MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e31f502235842f82a25d5ed5cbd20dec78ea1162ce81d239b8bbc86aace5b1c8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LummaStealer


Vendor detections: 11


Intelligence 11 IOCs YARA 2 File information Comments

SHA256 hash: e31f502235842f82a25d5ed5cbd20dec78ea1162ce81d239b8bbc86aace5b1c8
SHA3-384 hash: 26cbc0ee7e06b5fc025c3a2cb3e9aabc1285cef032f89b91c80b58448a0136e38af6c7248b153fc84621b4d5ef3ac186
SHA1 hash: 2a3318d2c43d495c4702b1bd3b4c76eb682784ac
MD5 hash: a2c6ec7f8e0ac411e2b149012a72723c
humanhash: montana-mirror-finch-monkey
File name:a2c6ec7f8e0ac411e2b149012a72723c.exe
Download: download sample
Signature LummaStealer
File size:12'336'128 bytes
First seen:2023-12-12 04:35:10 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 6e83dc74f9d35ad1c56d229da45f2b7b (1 x Stop, 1 x LummaStealer)
ssdeep 196608:htPwR7fxrT3j/9G0//8S9EM6YZx2xRXC2a+2G/8civr6MtC+JJCiGLjEXzI8Z4dg:bPw1xrbjYkkSGVCO5Cup/sBJHGkM8Z4M
TLSH T134C6336078CE7AFCF06AF7B8ABD2D2BE7578B7D684140F1B10B1A2434F521497E91468
TrID 63.5% (.EXE) Win64 Executable (generic) (10523/12/4)
12.2% (.EXE) OS/2 Executable (generic) (2029/13)
12.0% (.EXE) Generic Win/DOS Executable (2002/3)
12.0% (.EXE) DOS Executable Generic (2000/1)
File icon (PE):PE icon
dhash icon e4e4e0e090a4c484 (1 x LummaStealer)
Reporter abuse_ch
Tags:exe LummaStealer


Avatar
abuse_ch
LummaStealer C2:
194.33.191.102:21751

Intelligence


File Origin
# of uploads :
1
# of downloads :
343
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
https://puntosoporte.cl/wp-content/upgrade/release%20ver2.rar?search=bloque_de_publicidad.zip
Verdict:
Malicious activity
Analysis date:
2023-12-08 13:43:25 UTC
Tags:
privateloader g0njxa

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a process with a hidden window
Creating a window
Launching the default Windows debugger (dwwin.exe)
Launching a process
Searching for the window
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
DNS request
Sending a custom TCP request
Сreating synchronization primitives
Connecting to a non-recommended domain
Sending an HTTP GET request
Creating a file
Running batch commands
Query of malicious DNS domain
Sending a TCP request to an infection source
Unauthorized injection to a recently created process
Sending an HTTP GET request to an infection source
Gathering data
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
lolbin packed shell32
Result
Verdict:
MALICIOUS
Result
Threat name:
Petite Virus, PrivateLoader, RedLine, Ri
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Adds extensions / path to Windows Defender exclusion list (Registry)
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender real time protection (registry)
Disables Windows Defender (deletes autostart)
Drops PE files to the document folder of the user
Exclude list of file types from scheduled, custom, and real-time scanning
Found evasive API chain (may stop execution after checking locale)
Found malware configuration
Malicious sample detected (through community Yara rule)
Modifies Group Policy settings
PE file has nameless sections
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Snort IDS alert for network traffic
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Petite Virus
Yara detected PrivateLoader
Yara detected RedLine Stealer
Yara detected RisePro Stealer
Yara detected Socks5Systemz
Yara detected Stealc
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1359578 Sample: LU7TWS3uAl.exe Startdate: 12/12/2023 Architecture: WINDOWS Score: 100 141 www.maxmind.com 2->141 143 vk.com 2->143 145 11 other IPs or domains 2->145 169 Snort IDS alert for network traffic 2->169 171 Found malware configuration 2->171 173 Malicious sample detected (through community Yara rule) 2->173 175 17 other signatures 2->175 12 LU7TWS3uAl.exe 43 2->12         started        16 OfficeTrackerNMP131.exe 2->16         started        18 MaxLoonaFest131.exe 2->18         started        20 15 other processes 2->20 signatures3 process4 file5 127 C:\Users\user\AppData\Local\...\WW2_64.exe, PE32+ 12->127 dropped 129 C:\Users\user\AppData\...\win32security.pyd, PE32+ 12->129 dropped 131 C:\Users\user\AppData\...\win32process.pyd, PE32+ 12->131 dropped 137 27 other files (none is malicious) 12->137 dropped 195 Tries to detect virtualization through RDTSC time measurements 12->195 22 WW2_64.exe 5 12->22         started        133 C:\...\K0gsmqbKQusuJbkc5NZeeWqugaT2DQ04.zip, Zip 16->133 dropped 197 Detected unpacking (changes PE section rights) 16->197 199 Detected unpacking (overwrites its own PE header) 16->199 201 Tries to steal Mail credentials (via file / registry access) 16->201 209 4 other signatures 16->209 27 WerFault.exe 16->27         started        135 C:\...\HzG8qVY_f_V6JDeusNLovBGVA5zKdFzJ.zip, Zip 18->135 dropped 203 Tries to harvest and steal browser information (history, passwords, etc) 18->203 205 Query firmware table information (likely to detect VMs) 20->205 207 Changes security center settings (notifications, updates, antivirus, firewall) 20->207 29 WerFault.exe 20->29         started        31 WerFault.exe 20->31         started        signatures6 process7 dnsIp8 147 195.20.16.45, 49703, 49709, 49710 EITADAT-ASFI Finland 22->147 149 194.33.191.102, 21751, 49713, 49750 AQUA-ASRO unknown 22->149 151 13 other IPs or domains 22->151 101 C:\Users\...\rnSa9P5BxOO7KCxZuU_UWr38.exe, PE32 22->101 dropped 103 C:\Users\...\kYeMpMnmQQMGBB24ylWciope.exe, PE32 22->103 dropped 105 C:\Users\...\7FSKfU6PvIhGRIbmZNKSSofe.exe, PE32 22->105 dropped 107 C:\Users\...\71PI1s5xe_JZTwfvlpXb39kx.exe, PE32 22->107 dropped 177 Drops PE files to the document folder of the user 22->177 179 Tries to harvest and steal browser information (history, passwords, etc) 22->179 33 cmd.exe 1 22->33         started        35 cmd.exe 22->35         started        37 cmd.exe 1 22->37         started        39 cmd.exe 1 22->39         started        file9 signatures10 process11 process12 41 kYeMpMnmQQMGBB24ylWciope.exe 33->41         started        46 conhost.exe 33->46         started        48 71PI1s5xe_JZTwfvlpXb39kx.exe 35->48         started        50 conhost.exe 35->50         started        52 rnSa9P5BxOO7KCxZuU_UWr38.exe 49 37->52         started        54 conhost.exe 37->54         started        56 7FSKfU6PvIhGRIbmZNKSSofe.exe 8 5 39->56         started        58 conhost.exe 39->58         started        dnsIp13 153 ipinfo.io 34.117.59.81, 443, 49742, 49743 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 41->153 155 193.233.132.51, 49739, 49740, 49744 FREE-NET-ASFREEnetEU Russian Federation 41->155 109 C:\Users\user\AppData\...\MaxLoonaFest131.exe, PE32 41->109 dropped 111 C:\ProgramData\...\OfficeTrackerNMP131.exe, PE32 41->111 dropped 113 C:\Windows\System32behaviorgraphroupPolicybehaviorgraphPT.INI, ASCII 41->113 dropped 123 2 other files (1 malicious) 41->123 dropped 181 Tries to steal Mail credentials (via file / registry access) 41->181 183 Disables Windows Defender (deletes autostart) 41->183 185 Exclude list of file types from scheduled, custom, and real-time scanning 41->185 193 3 other signatures 41->193 60 schtasks.exe 41->60         started        62 schtasks.exe 41->62         started        115 C:\Users\...\71PI1s5xe_JZTwfvlpXb39kx.tmp, PE32 48->115 dropped 64 71PI1s5xe_JZTwfvlpXb39kx.tmp 48->64         started        157 5.42.64.41, 49731, 80 RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU Russian Federation 52->157 117 C:\Users\user\AppData\...\vcruntime140[1].dll, PE32 52->117 dropped 119 C:\Users\user\AppData\...\softokn3[1].dll, PE32 52->119 dropped 121 C:\Users\user\AppData\Local\...\nss3[1].dll, PE32 52->121 dropped 125 9 other files (none is malicious) 52->125 dropped 187 Tries to harvest and steal ftp login credentials 52->187 189 Tries to harvest and steal browser information (history, passwords, etc) 52->189 191 Tries to steal Crypto Currency Wallets 56->191 file14 signatures15 process16 file17 67 conhost.exe 60->67         started        69 conhost.exe 62->69         started        91 C:\Program Files (x86)behaviorgraphIFMount\gifmon.exe, PE32 64->91 dropped 93 C:\Program Files (x86)\...\is-E954H.tmp, PE32 64->93 dropped 95 C:\Program Files (x86)\...\is-95OIF.tmp, PE32 64->95 dropped 97 56 other files (none is malicious) 64->97 dropped 71 net.exe 64->71         started        73 gifmon.exe 64->73         started        76 schtasks.exe 64->76         started        78 gifmon.exe 64->78         started        process18 dnsIp19 81 OfficeTrackerNMP131.exe 67->81         started        85 conhost.exe 71->85         started        87 net1.exe 71->87         started        159 bvzbdgc.com 185.196.8.22 SIMPLECARRER2IT Switzerland 73->159 89 conhost.exe 76->89         started        139 C:\ProgramData\L76Storage\L76Storage.exe, PE32 78->139 dropped file20 process21 file22 99 C:\...\HlLmi98BpISUsN6aYQi2THj4EsmLqRbG.zip, Zip 81->99 dropped 161 Tries to steal Mail credentials (via file / registry access) 81->161 163 Disables Windows Defender (deletes autostart) 81->163 165 Tries to harvest and steal browser information (history, passwords, etc) 81->165 167 3 other signatures 81->167 signatures23
Threat name:
Win64.Spyware.RedLine
Status:
Malicious
First seen:
2023-12-08 08:18:33 UTC
File Type:
PE+ (Exe)
Extracted files:
34
AV detection:
21 of 37 (56.76%)
Threat level:
  2/5
Verdict:
unknown
Result
Malware family:
n/a
Score:
  8/10
Tags:
spyware stealer
Behaviour
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Accesses cryptocurrency files/wallets, possible credential harvesting
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Unpacked files
SH256 hash:
e31f502235842f82a25d5ed5cbd20dec78ea1162ce81d239b8bbc86aace5b1c8
MD5 hash:
a2c6ec7f8e0ac411e2b149012a72723c
SHA1 hash:
2a3318d2c43d495c4702b1bd3b4c76eb682784ac
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments