MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 18583cd242abdb7d4e1df46a8082c3c5d8ceb498a1bcabc3432ebdc244addf05. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LummaStealer


Vendor detections: 17


Intelligence 17 IOCs YARA 17 File information Comments

SHA256 hash: 18583cd242abdb7d4e1df46a8082c3c5d8ceb498a1bcabc3432ebdc244addf05
SHA3-384 hash: 64892870bbb2dfe13bd2d7c4b10d7b5cf838ddfc3f40bfb835692449b290fa0baf311fa126c4d5e96410bd85649f462b
SHA1 hash: a2c3a43fd2c1366a3540d6f853494df98064cddc
MD5 hash: b18f0c438fa60462e0adacf32efb5d1c
humanhash: triple-sixteen-freddie-carolina
File name:18583cd242abdb7d4e1df46a8082c3c5d8ceb498a1bcabc3432ebdc244addf05.bin
Download: download sample
Signature LummaStealer
File size:5'128'192 bytes
First seen:2026-04-01 18:31:24 UTC
Last seen:2026-04-07 23:18:16 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 87276645a61980fa58d8085fc4df7bae (12 x LummaStealer)
ssdeep 98304:poFpafW4nLrHp/qKm2/Sb/gqAZj+UzKb3HtF:dfWerRb/G8+H
TLSH T116366A43EBC219D5F38904369E044601DB29E96997EB03B1302C2199EF97397BF65A3F
TrID 38.2% (.EXE) Win64 Executable (generic) (6522/11/2)
26.4% (.EXE) Win32 Executable (generic) (4504/4/1)
11.8% (.EXE) OS/2 Executable (generic) (2029/13)
11.7% (.EXE) Generic Win/DOS Executable (2002/3)
11.7% (.EXE) DOS Executable (generic) (2000/1)
Magika pebin
Reporter threatcat_ch
Tags:exe LummaStealer

Intelligence


File Origin
# of uploads :
11
# of downloads :
156
Origin country :
CH CH
Vendor Threat Intelligence
Gathering data
Malware family:
n/a
ID:
1
File name:
18583cd242abdb7d4e1df46a8082c3c5d8ceb498a1bcabc3432ebdc244addf05.bin
Verdict:
Malicious activity
Analysis date:
2026-04-01 18:33:33 UTC
Tags:
lumma stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
vmdetect phishing
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a custom TCP request
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
adaptive-context anti-debug anti-vm crypto masquerade microsoft_visual_cc soft-404 spyagent
Verdict:
Malicious
File Type:
exe x32
First seen:
2026-04-01T14:33:00Z UTC
Last seen:
2026-04-03T05:28:00Z UTC
Hits:
~1000
Detections:
Trojan-PSW.Win32.Lumma.sb Trojan.Win32.Crypt.sb HEUR:Trojan-PSW.Win32.Stealerc.gen Trojan.Agentb.UDP.ServerRequest PDM:Trojan.Win32.Generic Trojan-PSW.Stealerc.UDP.ServerRequest Trojan-PSW.RisePro.UDP.ServerRequest Trojan-PSW.Lumma.HTTP.C&C Trojan-PSW.Coins.HTTP.C&C
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
88 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Found evasive API chain (may stop execution after checking computer name)
Found malware configuration
LummaC encrypted strings found
Multi AV Scanner detection for submitted file
Sample uses string decryption to hide its real strings
Yara detected LummaC Stealer
Behaviour
Behavior Graph:
Verdict:
inconclusive
YARA:
8 match(es)
Tags:
Executable Html PE (Portable Executable) PE File Layout Win 32 Exe x86
Threat name:
Win32.Trojan.LummaStealer
Status:
Malicious
First seen:
2026-04-01 18:32:25 UTC
File Type:
PE (Exe)
Extracted files:
7
AV detection:
31 of 38 (81.58%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
lummastealer
Similar samples:
Result
Malware family:
Score:
  10/10
Tags:
family:lumma discovery stealer
Behaviour
Program crash
System Location Discovery: System Language Discovery
Lumma Stealer, LummaC
Lumma family
Malware Config
C2 Extraction:
http://cakecoldsplurgrewe.pw/api
http://politefrightenpowoa.pw/api
Unpacked files
SH256 hash:
18583cd242abdb7d4e1df46a8082c3c5d8ceb498a1bcabc3432ebdc244addf05
MD5 hash:
b18f0c438fa60462e0adacf32efb5d1c
SHA1 hash:
a2c3a43fd2c1366a3540d6f853494df98064cddc
Detections:
win_lumma_a0
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerHiding__Thread
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:dependsonpythonailib
Author:Tim Brown
Description:Hunts for dependencies on Python AI libraries
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:Detect_all_IPv6_variants
Author:Bierchermuesli
Description:Generic IPv6 catcher
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:html_auto_download_b64
Author:Tdawg
Description:html auto download
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:telebot_framework
Author:vietdx.mb
Rule name:test_Malaysia
Author:rectifyq
Description:Detects file containing malaysia string
Rule name:TH_AntiVM_MassHunt_Win_Malware_2026_CYFARE
Author:CYFARE
Description:Detects Windows malware employing anti-VM / anti-sandbox evasion techniques across VMware, VirtualBox, Hyper-V, QEMU, Xen, and generic sandbox environments
Reference:https://cyfare.net/
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques
Rule name:Windows_Trojan_Afdk_c952fcfa
Author:Elastic Security
Rule name:WIN_WebSocket_Base64_C2_20250726
Author:dogsafetyforeverone
Description:Detects configuration strings used by malware to specify WebSocket command-and-control endpoints inside Base64-encoded data. It looks for prefixes such as '#ws://' or '#wss://' that were found in QuasarRAT configuration data.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

LummaStealer

Executable exe 18583cd242abdb7d4e1df46a8082c3c5d8ceb498a1bcabc3432ebdc244addf05

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments