MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ff1c1d6c42c8aa77fc465eea36ce1c671a78192b4ccfb3bd19c96dfde4cd182e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LummaStealer


Vendor detections: 14


Intelligence 14 IOCs YARA File information Comments

SHA256 hash: ff1c1d6c42c8aa77fc465eea36ce1c671a78192b4ccfb3bd19c96dfde4cd182e
SHA3-384 hash: ca773a9d020df4b6313cf3a6de9ec36aa54e60bc9d6f2848d70ee487c16149a7e4811e40e77aa7d7da6fecfffde5d6a2
SHA1 hash: 6c9af8cf6c18f742c303af348338aba933a3205c
MD5 hash: d9b04d2af6219860f6c2bebc8b5764eb
humanhash: sierra-mississippi-texas-hotel
File name:Setup.exe
Download: download sample
Signature LummaStealer
File size:99'614'719 bytes
First seen:2025-08-08 23:21:50 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32f3282581436269b3a75b6675fe3e08 (197 x LummaStealer, 122 x Rhadamanthys, 8 x CoinMiner)
ssdeep 24576:Bv3ARH724udGXGsDiH9/dMBxcFsQrj8x1SvmNmRHdrfMgmsS3mFWlM:V3hZdGUHFdIIsQrQDlw19jmsS2Ie
TLSH T10628028A83C862A7F01F92571AE9108F71B4BE67A260493E17D6714954C2F80DEF377B
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10522/11/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
dhash icon 3af9e4f4f4d4c464 (2 x LummaStealer)
Reporter aachum
Tags:AutoIT CypherIT exe LummaStealer


Avatar
iamaachum
https://productsdrive.click/?pwMdTNUkeHK1BqmEb73J0FYAsiv2VPQtGCruxD4z=2w9UP7svJuFSXjKIp0hx3nLli4omG1EOABqdTeV6z8y=MNldacL2iUeZChr14JA6QFW7kwfVE08TGXsP9SbzRuD5ovY&h=171 => https://mega.nz/file/XBlFAZCC#7IaYLa-Z7ec4Fkm8xbgFbmpCn6CWfLcZIVKyNhKhNPg

Intelligence


File Origin
# of uploads :
1
# of downloads :
80
Origin country :
ES ES
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
https://productsdrive.click/?jl7pdABvfK21mwoVrOFNYWbanUHPCy0GtI6xgQX8=YpLzgEt3Cn2TV5yOfbvmGcRJueajF48UxDNiKk1dPqH=NrmthLJxR40SM9nf7IeQoOXwCZqUcEHbF6lasdzA1TipV8D&h=4
Verdict:
Malicious activity
Analysis date:
2025-08-08 15:52:31 UTC
Tags:
arch-exec lumma stealer autoit qrcode hijackloader loader auto generic arechclient2 backdoor rat teapotstealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
97.4%
Tags:
autoit emotet
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a window
Creating a file
Searching for the window
Searching for the Windows task manager window
Running batch commands
Creating a process with a hidden window
Launching cmd.exe command interpreter
Launching a process
Using the Windows Management Instrumentation requests
Searching for synchronization primitives
Creating a process from a recently created file
DNS request
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
adaptive-context anti-debug blackhole installer microsoft_visual_cc overlay overlay packed
Result
Threat name:
LummaC Stealer
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
C2 URLs / IPs found in malware configuration
Detected CypherIt Packer
Drops PE files with a suspicious file extension
Found malware configuration
Joe Sandbox ML detected suspicious sample
Multi AV Scanner detection for submitted file
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Search for Antivirus process
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1753404 Sample: Setup.exe Startdate: 09/08/2025 Architecture: WINDOWS Score: 100 34 mocadia.com 2->34 36 mastwin.in 2->36 38 HMrNZbZTCpqKGllA.HMrNZbZTCpqKGllA 2->38 42 Suricata IDS alerts for network traffic 2->42 44 Found malware configuration 2->44 46 Multi AV Scanner detection for submitted file 2->46 48 5 other signatures 2->48 9 Setup.exe 25 2->9         started        signatures3 process4 file5 30 C:\Users\user\AppData\Local\...\nsExec.dll, PE32 9->30 dropped 12 cmd.exe 1 9->12         started        process6 signatures7 54 Detected CypherIt Packer 12->54 56 Drops PE files with a suspicious file extension 12->56 15 cmd.exe 4 12->15         started        18 conhost.exe 12->18         started        process8 file9 32 C:\Users\user\AppData\Local\Temp\...\Mel.pif, PE32 15->32 dropped 20 Mel.pif 15->20         started        24 extrac32.exe 19 15->24         started        26 tasklist.exe 1 15->26         started        28 2 other processes 15->28 process10 dnsIp11 40 mastwin.in 172.86.89.51, 443, 49695, 49696 M247GB United States 20->40 50 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 20->50 52 Query firmware table information (likely to detect VMs) 20->52 signatures12
Gathering data
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2025-08-08 19:02:22 UTC
File Type:
PE (Exe)
Extracted files:
16
AV detection:
10 of 24 (41.67%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:lumma discovery spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Windows directory
Enumerates processes with tasklist
Checks installed software on the system
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of local email clients
Lumma Stealer, LummaC
Lumma family
Malware Config
C2 Extraction:
https://mocadia.com/iuew
https://mastwin.in/qsaz/api
https://ordinarniyvrach.ru/xiur/api
https://yamakrug.ru/lzka/api
https://vishneviyjazz.ru/neco/api
https://yrokistorii.ru/uqya/api
https://stolewnica.ru/xjuf/api
https://visokiywkaf.ru/mmtn/api
https://kletkamozga.ru/iwyq/api
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

LummaStealer

Executable exe ff1c1d6c42c8aa77fc465eea36ce1c671a78192b4ccfb3bd19c96dfde4cd182e

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
Reviews
IDCapabilitiesEvidence
COM_BASE_APICan Download & Execute componentsole32.dll::CoCreateInstance
SHELL_APIManipulates System ShellSHELL32.dll::ShellExecuteW
SHELL32.dll::SHFileOperationW
SHELL32.dll::SHGetFileInfoW
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CreateProcessW
KERNEL32.dll::OpenProcess
KERNEL32.dll::CloseHandle
KERNEL32.dll::CreateThread
WIN_BASE_APIUses Win Base APIKERNEL32.dll::LoadLibraryW
KERNEL32.dll::LoadLibraryA
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::GetDiskFreeSpaceW
KERNEL32.dll::GetCommandLineW
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CopyFileW
KERNEL32.dll::CreateDirectoryW
KERNEL32.dll::CreateFileW
KERNEL32.dll::DeleteFileW
KERNEL32.dll::MoveFileW
KERNEL32.dll::GetWindowsDirectoryW
WIN_REG_APICan Manipulate Windows RegistryADVAPI32.dll::RegCreateKeyExW
ADVAPI32.dll::RegDeleteKeyW
ADVAPI32.dll::RegOpenKeyExW
ADVAPI32.dll::RegQueryValueExW
ADVAPI32.dll::RegSetValueExW
WIN_USER_APIPerforms GUI ActionsUSER32.dll::AppendMenuW
USER32.dll::EmptyClipboard
USER32.dll::FindWindowExW
USER32.dll::OpenClipboard
USER32.dll::PeekMessageW
USER32.dll::CreateWindowExW

Comments