MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e9d6b68a7005d52a9caa77bd238493442a002b09eeb6c52542a587631a92de88. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LummaStealer


Vendor detections: 15


Intelligence 15 IOCs YARA 1 File information Comments

SHA256 hash: e9d6b68a7005d52a9caa77bd238493442a002b09eeb6c52542a587631a92de88
SHA3-384 hash: 82038092755f1a0f439f65c58734632e5eb9c3064dded21bcc2e909274cc14e6cf11be7613d41530eb5c427fcd398d5e
SHA1 hash: 013aa5756aa4fea565a5e4f576af688dc65d7435
MD5 hash: d0bb2fa7815ae25e59827dd3e8a710ba
humanhash: michigan-mirror-pizza-texas
File name:d0bb2fa7815ae25e59827dd3e8a710ba.exe
Download: download sample
Signature LummaStealer
File size:1'862'144 bytes
First seen:2024-12-19 06:53:59 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 2eabe9054cad5152567f0699947a2c5b (2'852 x LummaStealer, 1'312 x Stealc, 1'026 x Healer)
ssdeep 49152:L2jxCMUk4I1hCR6tZiuOKrCg4OEcNwQ5SdnvNjULdb:L2jxCMUk/hCRKXcOzSdGB
TLSH T1B88533419BA32CE2D81580B1C77FD36B5E50190903D6D79CDA0C26569A3E3F2F829FA7
TrID 42.7% (.EXE) Win32 Executable (generic) (4504/4/1)
19.2% (.EXE) OS/2 Executable (generic) (2029/13)
19.0% (.EXE) Generic Win/DOS Executable (2002/3)
18.9% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
Reporter abuse_ch
Tags:exe LummaStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
421
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2024-12-18 20:41:38 UTC
Tags:
amadey botnet stealer loader unwanted netsupport remote lumma rhadamanthys tool stealc credentialflusher cryptbot auto coinminer arch-exec themida

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Searching for analyzing tools
Connection attempt to an infection source
Behavior that indicates a threat
DNS request
Connection attempt
Sending a custom TCP request
Query of malicious DNS domain
Sending a TCP request to an infection source
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed packed packer_detected
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
LummaC, Amadey, LummaC Stealer, Stealc,
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Attempt to bypass Chrome Application-Bound Encryption
C2 URLs / IPs found in malware configuration
Detected unpacking (changes PE section rights)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Drops PE files to the document folder of the user
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies windows update settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Suricata IDS alerts for network traffic
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Yara detected Amadeys stealer DLL
Yara detected LummaC Stealer
Yara detected Powershell download and execute
Yara detected Stealc
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1578033 Sample: AWrVzd6XpC.exe Startdate: 19/12/2024 Architecture: WINDOWS Score: 100 80 treehoneyi.click 2->80 82 sweepyribs.lat 2->82 84 2 other IPs or domains 2->84 110 Suricata IDS alerts for network traffic 2->110 112 Found malware configuration 2->112 114 Antivirus detection for URL or domain 2->114 116 16 other signatures 2->116 10 AWrVzd6XpC.exe 2 2->10         started        15 skotes.exe 19 2->15         started        17 skotes.exe 2->17         started        signatures3 process4 dnsIp5 92 185.215.113.16, 49744, 49801, 80 WHOLESALECONNECTIONSNL Portugal 10->92 94 grannyejh.lat 172.67.179.109, 443, 49730, 49731 CLOUDFLARENETUS United States 10->94 62 C:\Users\user\...\I8WIG9OBFWN5NKZK2DW5QG7.exe, PE32 10->62 dropped 64 C:\Users\...\BSXM76J67J2SWCC02VQCUVS8ZQNV.exe, PE32 10->64 dropped 156 Query firmware table information (likely to detect VMs) 10->156 158 Tries to harvest and steal ftp login credentials 10->158 160 Tries to harvest and steal browser information (history, passwords, etc) 10->160 168 4 other signatures 10->168 19 BSXM76J67J2SWCC02VQCUVS8ZQNV.exe 36 10->19         started        24 I8WIG9OBFWN5NKZK2DW5QG7.exe 9 1 10->24         started        96 185.215.113.43 WHOLESALECONNECTIONSNL Portugal 15->96 98 31.41.244.11 AEROEXPRESS-ASRU Russian Federation 15->98 66 C:\Users\user\AppData\...\59bcbe04f3.exe, PE32 15->66 dropped 68 C:\Users\user\AppData\...\8c6b987a2c.exe, PE32 15->68 dropped 70 C:\Users\user\AppData\Local\...\random[1].exe, PE32 15->70 dropped 72 C:\Users\user\AppData\Local\...\random[1].exe, PE32 15->72 dropped 162 Hides threads from debuggers 15->162 164 Tries to detect sandboxes / dynamic malware analysis system (registry check) 15->164 166 Tries to detect process monitoring tools (Task Manager, Process Explorer etc.) 15->166 26 59bcbe04f3.exe 15->26         started        28 8c6b987a2c.exe 15->28         started        file6 signatures7 process8 dnsIp9 86 185.215.113.206, 49745, 49759, 80 WHOLESALECONNECTIONSNL Portugal 19->86 88 127.0.0.1 unknown unknown 19->88 52 C:\Users\user\DocumentsbehaviorgraphCBKECAKFB.exe, PE32 19->52 dropped 54 C:\Users\user\AppData\...\softokn3[1].dll, PE32 19->54 dropped 56 C:\Users\user\AppData\Local\...\random[1].exe, PE32 19->56 dropped 58 11 other files (7 malicious) 19->58 dropped 122 Antivirus detection for dropped file 19->122 124 Detected unpacking (changes PE section rights) 19->124 126 Attempt to bypass Chrome Application-Bound Encryption 19->126 144 10 other signatures 19->144 30 cmd.exe 1 19->30         started        32 chrome.exe 19->32         started        128 Machine Learning detection for dropped file 24->128 130 Modifies windows update settings 24->130 132 Disables Windows Defender Tamper protection 24->132 146 3 other signatures 24->146 90 treehoneyi.click 172.67.180.113 CLOUDFLARENETUS United States 26->90 134 Multi AV Scanner detection for dropped file 26->134 136 Tries to detect sandboxes and other dynamic analysis tools (window names) 26->136 138 Tries to evade debugger and weak emulator (self modifying code) 26->138 140 Injects a PE file into a foreign processes 28->140 142 LummaC encrypted strings found 28->142 35 8c6b987a2c.exe 28->35         started        38 conhost.exe 28->38         started        file10 signatures11 process12 dnsIp13 40 GCBKECAKFB.exe 4 30->40         started        44 conhost.exe 30->44         started        74 192.168.2.4, 443, 49723, 49724 unknown unknown 32->74 76 239.255.255.250 unknown Reserved 32->76 46 chrome.exe 32->46         started        78 pancakedipyps.click 172.67.209.202 CLOUDFLARENETUS United States 35->78 118 Tries to harvest and steal browser information (history, passwords, etc) 35->118 120 Tries to steal Crypto Currency Wallets 35->120 signatures14 process15 dnsIp16 60 C:\Users\user\AppData\Local\...\skotes.exe, PE32 40->60 dropped 148 Antivirus detection for dropped file 40->148 150 Detected unpacking (changes PE section rights) 40->150 152 Machine Learning detection for dropped file 40->152 154 4 other signatures 40->154 49 skotes.exe 40->49         started        100 www.google.com 172.217.19.228, 443, 49749, 49750 GOOGLEUS United States 46->100 file17 signatures18 process19 signatures20 102 Antivirus detection for dropped file 49->102 104 Detected unpacking (changes PE section rights) 49->104 106 Machine Learning detection for dropped file 49->106 108 4 other signatures 49->108
Threat name:
Win32.Trojan.StealC
Status:
Malicious
First seen:
2024-12-18 23:23:29 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
28 of 38 (73.68%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
lummastealer
Similar samples:
Result
Malware family:
Score:
  10/10
Tags:
family:lumma family:stealc botnet:stok discovery evasion spyware stealer trojan
Behaviour
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Browser Information Discovery
System Location Discovery: System Language Discovery
Suspicious use of NtSetInformationThreadHideFromDebugger
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Checks BIOS information in registry
Executes dropped EXE
Identifies Wine through registry keys
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Windows security modification
Downloads MZ/PE file
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Lumma Stealer, LummaC
Lumma family
Modifies Windows Defender Real-time Protection settings
Stealc
Stealc family
Malware Config
C2 Extraction:
http://185.215.113.206
Verdict:
Suspicious
Tags:
lumma_stealer stealer c2 lumma
YARA:
n/a
Unpacked files
SH256 hash:
eb3089412e5aa977d5493e30620cd6fab35cc1dee507545dd72d7b39491b2d76
MD5 hash:
d217164edd644d931e44a24d4acd192d
SHA1 hash:
05f24a2566886150ea5177c11849916b47a27656
SH256 hash:
e9d6b68a7005d52a9caa77bd238493442a002b09eeb6c52542a587631a92de88
MD5 hash:
d0bb2fa7815ae25e59827dd3e8a710ba
SHA1 hash:
013aa5756aa4fea565a5e4f576af688dc65d7435
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

LummaStealer

Executable exe e9d6b68a7005d52a9caa77bd238493442a002b09eeb6c52542a587631a92de88

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
CHECK_NXMissing Non-Executable Memory Protectioncritical

Comments