MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 12b46f0bc6d8e8ef0969236de745c8bea871cf89ddf70d687802bd1a751a635e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LummaStealer


Vendor detections: 14


Intelligence 14 IOCs YARA 27 File information Comments

SHA256 hash: 12b46f0bc6d8e8ef0969236de745c8bea871cf89ddf70d687802bd1a751a635e
SHA3-384 hash: 2be670979cba6f56fbba94dce7f962301086a2d27f52201b21197f9992e35c5b020f7fe90c75404e1380c27da6dd5d15
SHA1 hash: 431a0e02b10f76538e2d28b26168789b813115ae
MD5 hash: cb54751f0eddc7fb6e0616c89d01d0be
humanhash: tennessee-wyoming-spaghetti-mobile
File name:aWjs9NG.exe
Download: download sample
Signature LummaStealer
File size:11'388'672 bytes
First seen:2025-08-08 16:56:47 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 85dce9e24726e4259fb8fe13346e7e78 (1 x ACRStealer, 1 x LummaStealer)
ssdeep 196608:U164CCREtWQO49krltGIpi9P5QlnT4pAIOnB0kpAxYiq5OuYwQ330ih8m8CN6xkr:U1n2xO2krltGIpiQpT4pAIGW96OxwQ3L
TLSH T1AFB69E12F5B0C134F5E73276793C6739A9317EA2AF3145CB86906C846FB46E2213936B
TrID 49.9% (.EXE) Win64 Executable (generic) (10522/11/4)
21.3% (.EXE) Win32 Executable (generic) (4504/4/1)
9.6% (.EXE) OS/2 Executable (generic) (2029/13)
9.5% (.EXE) Generic Win/DOS Executable (2002/3)
9.4% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
Reporter abuse_ch
Tags:exe LummaStealer signed

Code Signing Certificate

Organisation:OpenJS
Issuer:OpenJS
Algorithm:sha256WithRSAEncryption
Valid from:2025-08-07T19:54:15Z
Valid to:2026-08-07T19:54:15Z
Serial number: 38129ddc6f9baaf3f22c320c7965dd4e53e4a7e6
Thumbprint Algorithm:SHA256
Thumbprint: 7c937053bf25d88510a21c1b943c1940e04d97456829fe8ad4822ef56a02f6f6
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
72
Origin country :
SE SE
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
65b4b5eba3f18d3b84d9d431c29d44700183cbf265a70848e118307931130d78.bin.exe
Verdict:
Malicious activity
Analysis date:
2025-08-08 00:04:11 UTC
Tags:
lumma stealer themida loader amadey auto redline botnet auto-reg gcleaner rdp telegram autoit stealc golang vidar evasion

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
phishing autorun
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Running batch commands
Creating a process with a hidden window
Launching a process
Result
Threat name:
LummaC Stealer
Detection:
malicious
Classification:
troj.spyw.evad
Score:
96 / 100
Signature
Joe Sandbox ML detected suspicious sample
Powershell creates an autostart link
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sigma detected: Potential Startup Shortcut Persistence Via PowerShell.EXE
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal from password manager
Yara detected LummaC Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1753212 Sample: aWjs9NG.exe Startdate: 08/08/2025 Architecture: WINDOWS Score: 96 61 www.google.com 2->61 63 invertdbdi.top 2->63 83 Suricata IDS alerts for network traffic 2->83 85 Yara detected LummaC Stealer 2->85 87 Sigma detected: Potential Startup Shortcut Persistence Via PowerShell.EXE 2->87 89 Joe Sandbox ML detected suspicious sample 2->89 10 aWjs9NG.exe 2->10         started        13 1235.exe 2->13         started        signatures3 process4 signatures5 91 Suspicious powershell command line found 10->91 15 cmd.exe 3 10->15         started        18 powershell.exe 18 10->18         started        93 Tries to steal Crypto Currency Wallets 13->93 21 chrome.exe 13->21         started        23 chrome.exe 13->23         started        25 chrome.exe 13->25         started        process6 file7 55 C:\Users\user\AppData\Roaming\1235.exe, PE32 15->55 dropped 57 C:\Users\user\...\1235.exe:Zone.Identifier, ASCII 15->57 dropped 27 1235.exe 15->27         started        31 conhost.exe 15->31         started        33 timeout.exe 1 15->33         started        59 C:\Users\user\AppData\Roaming\...\rLzQ.lnk, MS 18->59 dropped 81 Powershell creates an autostart link 18->81 35 conhost.exe 18->35         started        37 chrome.exe 21->37         started        39 chrome.exe 23->39         started        signatures8 process9 dnsIp10 71 invertdbdi.top 172.86.89.51, 443, 49692, 49717 M247GB United States 27->71 95 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 27->95 97 Query firmware table information (likely to detect VMs) 27->97 99 Tries to harvest and steal ftp login credentials 27->99 101 3 other signatures 27->101 41 chrome.exe 27->41         started        44 chrome.exe 27->44         started        46 chrome.exe 27->46         started        48 chrome.exe 27->48         started        73 142.250.81.228, 443, 49727, 49728 GOOGLEUS United States 37->73 75 www.google.com 37->75 77 142.251.40.228, 443, 49737, 49738 GOOGLEUS United States 39->77 79 www.google.com 39->79 signatures11 process12 dnsIp13 69 192.168.2.6, 138, 443, 49571 unknown unknown 41->69 50 chrome.exe 41->50         started        53 chrome.exe 44->53         started        process14 dnsIp15 65 www.google.com 142.250.80.68, 443, 49697, 49700 GOOGLEUS United States 50->65 67 142.251.35.164, 443, 49712, 49713 GOOGLEUS United States 53->67
Verdict:
inconclusive
YARA:
9 match(es)
Tags:
Executable Html Javascript in Html PDB Path PE (Portable Executable) SFX 7z Win 32 Exe x86
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2025-08-07 20:00:58 UTC
File Type:
PE (Exe)
Extracted files:
142
AV detection:
5 of 24 (20.83%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
lummastealer
Similar samples:
Result
Malware family:
n/a
Score:
  8/10
Tags:
defense_evasion discovery execution
Behaviour
Delays execution with timeout.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
Drops startup file
Executes dropped EXE
Command and Scripting Interpreter: PowerShell
Unpacked files
SH256 hash:
12b46f0bc6d8e8ef0969236de745c8bea871cf89ddf70d687802bd1a751a635e
MD5 hash:
cb54751f0eddc7fb6e0616c89d01d0be
SHA1 hash:
431a0e02b10f76538e2d28b26168789b813115ae
SH256 hash:
a888d2def28a8b88a9064a22e921d41c2854e40e2061beb1b03953fa8fb4d789
MD5 hash:
b9ff6c227b2c7f9bf95a9400ceec3055
SHA1 hash:
557d36fcaecabb407e11a01cd0488670a7843434
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:adonunix2
Author:Tim Brown @timb_machine
Description:AD on UNIX
Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:botnet_plaintext_c2
Author:cip
Description:Attempts to match at least some of the strings used in some botnet variants which use plaintext communication protocols.
Rule name:Check_OutputDebugStringA_iat
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:detect_RWS_pe_rule
Author:wonderkun
Description:Detects RWX-S signed binaries. This only verifies that the image contains a signature, not that it is valid.
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:HUNTING_SUSP_TLS_SECTION
Author:chaosphere
Description:Detect PE files with .tls section that can be used for anti-debugging
Reference:Practical Malware Analysis - Chapter 16
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:maldoc_getEIP_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:maldoc_OLE_file_magic_number
Author:Didier Stevens (https://DidierStevens.com)
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:pe_detect_tls_callbacks
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:reverse_http
Author:CD_R0M_
Description:Identify strings with http reversed (ptth)
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:test_Malaysia
Author:rectifyq
Description:Detects file containing malaysia string
Rule name:yara_template

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

LummaStealer

Executable exe 12b46f0bc6d8e8ef0969236de745c8bea871cf89ddf70d687802bd1a751a635e

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (GUARD_CF)high
Reviews
IDCapabilitiesEvidence
KERNEL_APIManipulates Windows Kernel & Driversntdll.dll::RtlInitUnicodeString
WIN32_PROCESS_APICan Create Process and Threadskernel32.dll::CreateRemoteThread
kernel32.dll::OpenProcess
kernel32.dll::VirtualAllocEx
kernel32.dll::WriteProcessMemory
kernel32.dll::CloseHandle
kernel32.dll::CreateThread
WIN_BASE_APIUses Win Base APIntdll.dll::NtQuerySystemInformation
kernel32.dll::LoadLibraryW
kernel32.dll::LoadLibraryA
kernel32.dll::GetSystemInfo
kernel32.dll::GetStartupInfoA
kernel32.dll::GetCommandLineA
WIN_BASE_EXEC_APICan Execute other programskernel32.dll::GetConsoleMode
kernel32.dll::GetConsoleOutputCP
kernel32.dll::GetConsoleCP
WIN_BASE_IO_APICan Create Fileskernel32.dll::CreateDirectoryW
kernel32.dll::CreateFileW
kernel32.dll::DeleteFileW
kernel32.dll::GetWindowsDirectoryA
kernel32.dll::GetWindowsDirectoryW
kernel32.dll::GetSystemDirectoryW
WIN_BASE_USER_APIRetrieves Account Informationkernel32.dll::QueryDosDeviceW
WIN_REG_APICan Manipulate Windows Registryadvapi32.dll::RegOpenKeyA

Comments