MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 160a3c92e951e6185506aab0c2b8c2a1889ec4e8990fb28e0291d3261c61606e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LummaStealer


Vendor detections: 17


Intelligence 17 IOCs YARA 1 File information Comments

SHA256 hash: 160a3c92e951e6185506aab0c2b8c2a1889ec4e8990fb28e0291d3261c61606e
SHA3-384 hash: 78ae4d799df747c070907b61a918c9bb21cf8039d20aa2411b5a6f9ae7d06377dee8b96c47d12b65906b0e718b25e7ce
SHA1 hash: 580fa73c9232c306614b32e150737bbde5ed7cf4
MD5 hash: c8b0ab9f67358ee7e55e91c8d4adc1be
humanhash: white-friend-mockingbird-beryllium
File name:c8b0ab9f67358ee7e55e91c8d4adc1be.exe
Download: download sample
Signature LummaStealer
File size:1'891'328 bytes
First seen:2025-06-05 15:23:49 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 2eabe9054cad5152567f0699947a2c5b (2'852 x LummaStealer, 1'312 x Stealc, 1'026 x Healer)
ssdeep 49152:Ni0qnqnqfEurzXdYldRqQj1HbgMuL4qORu:s0dVuvXdYlmQj1QH
TLSH T1699533F47D606791EF796E7C1E19E04181B4B2331ADEA424B637CBA346A21C34CF94B5
TrID 42.7% (.EXE) Win32 Executable (generic) (4504/4/1)
19.2% (.EXE) OS/2 Executable (generic) (2029/13)
19.0% (.EXE) Generic Win/DOS Executable (2002/3)
18.9% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
Reporter abuse_ch
Tags:exe LummaStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
399
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
random.exe
Verdict:
Malicious activity
Analysis date:
2025-06-05 14:21:40 UTC
Tags:
lumma stealer loader amadey botnet telegram enigma antivm rdp delphi gcleaner

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
97.4%
Tags:
vmprotect vmdetect autorun emotet
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Searching for analyzing tools
Searching for the window
Connection attempt to an infection source
DNS request
Connection attempt
Sending an HTTP GET request
Using the Windows Management Instrumentation requests
Query of malicious DNS domain
Sending a TCP request to an infection source
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
packed packed packer_detected
Result
Threat name:
Amadey, Clipboard Hijacker, Go Stealer, , LummaC Stealer
Detection:
malicious
Classification:
phis.troj.spyw.expl.evad.mine
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Attempt to bypass Chrome Application-Bound Encryption
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to start a terminal service
Creates autostart registry keys with suspicious values (likely registry only malware)
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Early bird code injection technique detected
Found direct / indirect Syscall (likely to bypass EDR)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found stalling execution ending in API Sleep call
Found strings related to Crypto-Mining
Found Tor onion address
Hides threads from debuggers
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites Mozilla Firefox settings
PE file contains section with special chars
PE file has nameless sections
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Queues an APC in another process (thread injection)
Reads the Security eventlog
Reads the System eventlog
Sample uses string decryption to hide its real strings
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Potential Data Stealing Via Chromium Headless Debugging
Sigma detected: Silenttrinity Stager Msbuild Activity
Sigma detected: Suspect Svchost Activity
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal from password manager
Writes to foreign memory regions
Yara detected Amadey
Yara detected Amadeys Clipper DLL
Yara detected Clipboard Hijacker
Yara detected Go Stealer
Yara detected LummaC Stealer
Yara detected Pentagon Stealer
Yara detected Vidar stealer
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1707337 Sample: ERSNFfY9lD.exe Startdate: 05/06/2025 Architecture: WINDOWS Score: 100 111 heartokait.digital 2->111 113 fleurdcuyt.digital 2->113 115 13 other IPs or domains 2->115 147 Suricata IDS alerts for network traffic 2->147 149 Found malware configuration 2->149 151 Malicious sample detected (through community Yara rule) 2->151 153 25 other signatures 2->153 10 ramez.exe 1 52 2->10         started        15 ERSNFfY9lD.exe 1 2->15         started        17 8979cbc52f.exe 2->17         started        19 4 other processes 2->19 signatures3 process4 dnsIp5 131 185.156.72.61 ITDELUXE-ASRU Russian Federation 10->131 133 185.156.72.96, 49729, 49730, 49732 ITDELUXE-ASRU Russian Federation 10->133 101 C:\Users\user\AppData\...\2b4dc46660.exe, PE32+ 10->101 dropped 103 C:\Users\user\AppData\Local\...\8f2lGlV.exe, PE32 10->103 dropped 105 C:\Users\user\AppData\Local\...\amnew.exe, PE32 10->105 dropped 109 23 other malicious files 10->109 dropped 207 Contains functionality to start a terminal service 10->207 209 Creates multiple autostart registry keys 10->209 211 Hides threads from debuggers 10->211 21 BxwOjsy.exe 10->21         started        25 8979cbc52f.exe 10->25         started        27 sGe7ljJ.exe 10->27         started        35 8 other processes 10->35 135 185.156.72.2, 49728, 49731, 49734 ITDELUXE-ASRU Russian Federation 15->135 137 heartokait.digital 195.82.147.188, 443, 49718, 49719 DREAMTORRENT-CORP-ASRU Russian Federation 15->137 107 C:\Users\...\V2SZ3PMXSX121YKLI34RLQIX8E.exe, PE32 15->107 dropped 213 Detected unpacking (changes PE section rights) 15->213 215 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 15->215 217 Query firmware table information (likely to detect VMs) 15->217 225 3 other signatures 15->225 29 V2SZ3PMXSX121YKLI34RLQIX8E.exe 4 15->29         started        219 Tries to steal Crypto Currency Wallets 17->219 221 Tries to detect sandboxes / dynamic malware analysis system (registry check) 17->221 223 Tries to detect process monitoring tools (Task Manager, Process Explorer etc.) 17->223 31 chrome.exe 17->31         started        33 chrome.exe 17->33         started        37 2 other processes 17->37 39 2 other processes 19->39 file6 signatures7 process8 file9 83 C:\Users\user\AppData\Local\Temp\...\2.exe, PE32 21->83 dropped 85 C:\Users\user\AppData\Local\Temp\...\1.exe, PE32+ 21->85 dropped 155 Multi AV Scanner detection for dropped file 21->155 157 Found many strings related to Crypto-Wallets (likely being stolen) 21->157 159 Found Tor onion address 21->159 41 1.exe 21->41         started        46 2.exe 21->46         started        87 C:\Users\...\ALSUPXJM0O17W13W63NU3VJBKU.exe, PE32 25->87 dropped 161 Antivirus detection for dropped file 25->161 163 Detected unpacking (changes PE section rights) 25->163 165 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 25->165 173 8 other signatures 25->173 48 ALSUPXJM0O17W13W63NU3VJBKU.exe 25->48         started        175 3 other signatures 27->175 50 MSBuild.exe 27->50         started        52 conhost.exe 27->52         started        89 C:\Users\user\AppData\Local\...\ramez.exe, PE32 29->89 dropped 167 Contains functionality to start a terminal service 29->167 177 2 other signatures 29->177 54 ramez.exe 29->54         started        56 chrome.exe 31->56         started        58 chrome.exe 33->58         started        91 C:\Users\user\AppData\Local\...\varen.exe, PE32 35->91 dropped 169 Early bird code injection technique detected 35->169 171 Found strings related to Crypto-Mining 35->171 179 4 other signatures 35->179 60 13 other processes 35->60 signatures10 process11 dnsIp12 125 2 other IPs or domains 41->125 95 C:\Users\user\...\cookies-copy.sqlite-shm, data 41->95 dropped 97 C:\Users\user\AppData\...\cookies-copy.sqlite, SQLite 41->97 dropped 181 Attempt to bypass Chrome Application-Bound Encryption 41->181 201 3 other signatures 41->201 62 chrome.exe 41->62         started        65 msedge.exe 41->65         started        67 conhost.exe 41->67         started        74 4 other processes 41->74 99 C:\Users\user\AppData\...\cns5ehd1.cmdline, Unicode 46->99 dropped 203 4 other signatures 46->203 69 csc.exe 46->69         started        72 conhost.exe 46->72         started        183 Antivirus detection for dropped file 48->183 185 Hides threads from debuggers 48->185 187 Query firmware table information (likely to detect VMs) 50->187 205 3 other signatures 50->205 189 Detected unpacking (changes PE section rights) 54->189 191 Contains functionality to start a terminal service 54->191 193 Found stalling execution ending in API Sleep call 54->193 117 142.250.114.105 GOOGLEUS United States 56->117 127 3 other IPs or domains 56->127 119 142.250.114.104 GOOGLEUS United States 58->119 129 3 other IPs or domains 58->129 121 t.me 149.154.167.99, 443, 49733 TELEGRAMRU United Kingdom 60->121 123 23.95.245.178 AS-COLOCROSSINGUS United States 60->123 195 Multi AV Scanner detection for dropped file 60->195 197 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 60->197 199 Tries to steal Crypto Currency Wallets 60->199 file13 signatures14 process15 dnsIp16 145 192.168.2.4, 443, 49711, 49718 unknown unknown 62->145 76 chrome.exe 62->76         started        79 msedge.exe 65->79         started        93 C:\Users\user\AppData\Local\...\cns5ehd1.dll, PE32 69->93 dropped 81 cvtres.exe 69->81         started        file17 process18 dnsIp19 139 www.google.com 142.251.186.103, 443, 49755, 49756 GOOGLEUS United States 76->139 141 plus.l.google.com 76->141 143 3 other IPs or domains 76->143
Threat name:
Win32.Trojan.Symmi
Status:
Malicious
First seen:
2025-06-05 15:25:16 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
21 of 24 (87.50%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
lummastealer
Similar samples:
Result
Malware family:
Score:
  10/10
Tags:
family:lumma defense_evasion discovery spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
System Location Discovery: System Language Discovery
Suspicious use of NtSetInformationThreadHideFromDebugger
Checks installed software on the system
Checks BIOS information in registry
Identifies Wine through registry keys
Reads user/profile data of local email clients
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Lumma Stealer, LummaC
Lumma family
Malware Config
C2 Extraction:
https://battlefled.top/gaoi
https://narrathfpt.top/tekq
https://escczlv.top/bufi
https://localixbiw.top/zlpa
https://korxddl.top/qidz
https://stochalyqp.xyz/alfp
https://diecam.top/laur/api
https://citellcagt.top/gjtu
https://peppinqikp.xyz/xaow
Unpacked files
SH256 hash:
160a3c92e951e6185506aab0c2b8c2a1889ec4e8990fb28e0291d3261c61606e
MD5 hash:
c8b0ab9f67358ee7e55e91c8d4adc1be
SHA1 hash:
580fa73c9232c306614b32e150737bbde5ed7cf4
SH256 hash:
a281535c03ef67ee3ed69ba6a2b5d3e7ca8fffb02fca0ea6abd673ea5a731890
MD5 hash:
d5054733c4e9b0ca385ee241393d0fbc
SHA1 hash:
f9b5903e9e96071c084b2b86812cf444d3988d1a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments