MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 e3f62a76a1fabd16483b653275fec991c181aa02ea26bc114378cd424e4e3a2c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
LummaStealer
Vendor detections: 14
| SHA256 hash: | e3f62a76a1fabd16483b653275fec991c181aa02ea26bc114378cd424e4e3a2c |
|---|---|
| SHA3-384 hash: | 9c626fce3ecaaf7079e15aeeb4d502ea294be729fb9920b8518e0347731a012088ae9f2cc14cba07179ce290652a66cb |
| SHA1 hash: | ee6eae907c4ab393ecdf937fc67958fdaccef391 |
| MD5 hash: | 5d560007e3d92042ece1513d6e5ed465 |
| humanhash: | river-winter-michigan-ohio |
| File name: | 5d560007e3d92042ece1513d6e5ed465.exe |
| Download: | download sample |
| Signature | LummaStealer |
| File size: | 1'410'048 bytes |
| First seen: | 2023-11-11 17:45:50 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader) |
| ssdeep | 24576:XyBjdD7z402aeYIuihs1Je+mUQp7w1dGgkK1R9I1L3icklXiV+j:iBjdH8Sevva1Rf42ffOWn9 |
| Threatray | 212 similar samples on MalwareBazaar |
| TLSH | T104652396BBEA0437F436277A58F6039702307D6159B8832F2306751B75F2ED0AA7136B |
| TrID | 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60) 11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 3.7% (.EXE) Win64 Executable (generic) (10523/12/4) 2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) |
| File icon (PE): | |
| dhash icon | f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader) |
| Reporter | |
| Tags: | exe LummaStealer |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
5.42.92.51:19057
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | cobalt_strike_tmp01925d3f |
|---|---|
| Author: | The DFIR Report |
| Description: | files - file ~tmp01925d3f.exe |
| Reference: | https://thedfirreport.com |
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | detect_Redline_Stealer |
|---|---|
| Author: | Varp0s |
| Rule name: | INDICATOR_EXE_Packed_ConfuserEx |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables packed with ConfuserEx Mod |
| Rule name: | maldoc_find_kernel32_base_method_1 |
|---|---|
| Author: | Didier Stevens (https://DidierStevens.com) |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | RIPEMD160_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for RIPEMD-160 constants |
| Rule name: | SHA1_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for SHA1 constants |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | win_redline_wextract_hunting_oct_2023 |
|---|---|
| Author: | Matthew @ Embee_Research |
| Description: | Detects wextract archives related to redline/amadey |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.