MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1344e9f78d9e8351e6be76413e68db37197896a082e43a91922f68da7c184b17. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LummaStealer


Vendor detections: 15


Intelligence 15 IOCs YARA 15 File information Comments

SHA256 hash: 1344e9f78d9e8351e6be76413e68db37197896a082e43a91922f68da7c184b17
SHA3-384 hash: 54449f705ab3424d4d1113fc86c7dd41144a8a4fe9c70632d0975af3c9fc562e96ca745f4c4f09eb671b42e43bd8e356
SHA1 hash: 2d72fb2906f1b299c83d0c0da0b5d10d89caa978
MD5 hash: 4c324afc05dd4f0daec6e245d9f5d825
humanhash: mexico-stream-nevada-earth
File name:4c324afc05dd4f0daec6e245d9f5d825.exe
Download: download sample
Signature LummaStealer
File size:1'771'520 bytes
First seen:2025-02-26 08:17:01 UTC
Last seen:2025-02-26 08:57:58 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash dfcb3dc2ab2596fd7c8611152299cc0a (1 x LummaStealer)
ssdeep 24576:75HmBCtH7sHohmANZASWCTR23swZuZwRSLMnyI+uls9c0VapZOaZkQjvt2DhzO:9mYhqsm0tR23s71LMyDEqapZCStqO
TLSH T1B3857F64E61298B5E5D34C70206FE23BE130772CE0398966EFE45E5876FFB526C8850B
TrID 37.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
20.0% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
12.7% (.EXE) Win64 Executable (generic) (10522/11/4)
7.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
6.1% (.EXE) Win16 NE executable (generic) (5038/12/1)
Magika pebin
dhash icon 52296868e833b20c (6 x RustyStealer, 2 x AsyncRAT, 2 x QuasarRAT)
Reporter abuse_ch
Tags:exe LummaStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
357
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
745d5cd64aee1b5c9f396c367c36e89a.exe
Verdict:
Malicious activity
Analysis date:
2025-02-26 08:47:47 UTC
Tags:
lumma stealer themida loader amadey stealc botnet opendir putty tool tas17 auto generic rdp telegram vidar

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
96.5%
Tags:
shellcode virus
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
DNS request
Connection attempt
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
adaptive-context anti-debug anti-vm expand lolbin obfuscated packed packed packer_detected
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
LummaC Stealer
Detection:
malicious
Classification:
troj.spyw
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Found malware configuration
Infostealer behavior detected
Multi AV Scanner detection for submitted file
Sample uses string decryption to hide its real strings
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Amadey
Status:
Malicious
First seen:
2025-02-25 20:29:11 UTC
File Type:
PE (Exe)
Extracted files:
8
AV detection:
18 of 24 (75.00%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
lummastealer
Similar samples:
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
System Location Discovery: System Language Discovery
Checks installed software on the system
Reads user/profile data of local email clients
Verdict:
Malicious
Tags:
lumma_stealer stealer c2 lumma
YARA:
n/a
Unpacked files
SH256 hash:
1344e9f78d9e8351e6be76413e68db37197896a082e43a91922f68da7c184b17
MD5 hash:
4c324afc05dd4f0daec6e245d9f5d825
SHA1 hash:
2d72fb2906f1b299c83d0c0da0b5d10d89caa978
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Check_OutputDebugStringA_iat
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:Lumma
Author:kevoreilly
Description:Lumma Payload
Rule name:pe_detect_tls_callbacks
Rule name:ProgramLanguage_Rust
Author:albertzsigovits
Description:Application written in Rust programming language
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:Rustyloader_mem_loose
Author:James_inthe_box
Description:Corroded buerloader
Reference:https://app.any.run/tasks/83064edd-c7eb-4558-85e8-621db72b2a24
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Windows_Trojan_Lumma_4ad749b0
Author:Elastic Security
Rule name:win_lumma_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.lumma.
Rule name:win_lumma_generic
Author:dubfib

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

LummaStealer

Executable exe 1344e9f78d9e8351e6be76413e68db37197896a082e43a91922f68da7c184b17

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
Reviews
IDCapabilitiesEvidence
SECURITY_BASE_APIUses Security Base APIadvapi32.dll::GetTokenInformation
WIN32_PROCESS_APICan Create Process and Threadskernel32.dll::CreateProcessW
advapi32.dll::OpenProcessToken
KERNEL32.dll::OpenProcess
kernel32.dll::CloseHandle
kernel32.dll::CreateThread
WIN_BASE_APIUses Win Base APIkernel32.dll::LoadLibraryA
kernel32.dll::GetCommandLineW
WIN_BASE_EXEC_APICan Execute other programskernel32.dll::WriteConsoleW
kernel32.dll::GetConsoleMode
kernel32.dll::GetConsoleOutputCP
WIN_BASE_IO_APICan Create Fileskernel32.dll::CreateFileMappingA
kernel32.dll::CreateFileW
kernel32.dll::GetWindowsDirectoryW
kernel32.dll::GetSystemDirectoryW
kernel32.dll::GetFileAttributesW
WIN_BCRYPT_APICan Encrypt Filesbcrypt.dll::BCryptGenRandom

Comments