MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2a2b75810cfd40cd803149592adbc5ae85d7a1c5f91a3cfa3c1593a1f84381c8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LummaStealer


Vendor detections: 18


Intelligence 18 IOCs YARA 10 File information Comments

SHA256 hash: 2a2b75810cfd40cd803149592adbc5ae85d7a1c5f91a3cfa3c1593a1f84381c8
SHA3-384 hash: 2114f175e689aa36fb5376d6b00302c15581121713a0a8f596ea5b0a428aac8280f01fa34024bf5a7e5719fda7e73970
SHA1 hash: b5276b1931d9c3f02df4cdf47122d343435cf12d
MD5 hash: 0c1a88f4d59cc9dcb511e1b6da9409d8
humanhash: michigan-eight-beer-utah
File name:InterWebz.exe
Download: download sample
Signature LummaStealer
File size:783'872 bytes
First seen:2025-09-11 13:14:36 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c9391c4d011b74463c0b80c8ef62af14 (4 x LummaStealer, 2 x Rhadamanthys, 1 x NanoCore)
ssdeep 12288:V+Az7qPnHDIR4AwFNnsyJO7mSpafg++XcW6WWYuq7vid1IDef7OvSGEyiaEF:R7WfF3nHO7mxfg+8t6NHoiq55FiaQ
Threatray 2 similar samples on MalwareBazaar
TLSH T183F4F102F0F3A0B3F653A5F02A39D6A4582DE6B27B344DEB2054F2341A759D3577262B
TrID 49.9% (.EXE) Win64 Executable (generic) (10522/11/4)
21.3% (.EXE) Win32 Executable (generic) (4504/4/1)
9.6% (.EXE) OS/2 Executable (generic) (2029/13)
9.5% (.EXE) Generic Win/DOS Executable (2002/3)
9.4% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
Reporter burger
Tags:exe LummaStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
123
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
InterWebz.exe
Verdict:
Malicious activity
Analysis date:
2025-09-11 13:10:46 UTC
Tags:
lumma stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
93.3%
Tags:
phishing virus
Result
Verdict:
Malware
Maliciousness:

Behaviour
Connection attempt to an infection source
Using the Windows Management Instrumentation requests
Сreating synchronization primitives
Query of malicious DNS domain
Sending a TCP request to an infection source
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
keylogger microsoft_visual_cc packed
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-09-11T10:15:00Z UTC
Last seen:
2025-09-11T10:15:00Z UTC
Hits:
~10
Detections:
Trojan-PSW.Win32.Lumma.vwr Trojan-PSW.Win32.Lumma.sb PDM:Trojan.Win32.Generic
Result
Threat name:
LummaC Stealer
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus detection for dropped file
Antivirus detection for URL or domain
Bypasses PowerShell execution policy
Connects to many ports of the same IP (likely port scanning)
Contains functionality to inject code into remote processes
Contains functionality to start a terminal service
Detected CypherIt Packer
Drops PE files with a suspicious file extension
Encrypted powershell cmdline option found
Found direct / indirect Syscall (likely to bypass EDR)
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Sigma detected: Drops script at startup location
Sigma detected: Search for Antivirus process
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal from password manager
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Yara detected LummaC Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1775610 Sample: InterWebz.exe Startdate: 11/09/2025 Architecture: WINDOWS Score: 100 124 telemety-xbox.lol 2->124 126 cnr.microsoft-telemetry.cc 2->126 128 4 other IPs or domains 2->128 144 Suricata IDS alerts for network traffic 2->144 146 Antivirus detection for URL or domain 2->146 148 Multi AV Scanner detection for submitted file 2->148 150 12 other signatures 2->150 13 InterWebz.exe 3 2->13         started        18 Fwkdagwk.exe 13 2->18         started        20 EduSphere.bat 2->20         started        22 3 other processes 2->22 signatures3 process4 dnsIp5 132 consnbx.su 64.227.2.250, 443, 49685, 49721 DIGITALOCEAN-ASNUS United States 13->132 134 microsoft-telemetry.cc 23.94.252.8, 49727, 49728, 49729 AS-COLOCROSSINGUS United States 13->134 110 C:\Users\...\KMFZ8B9P57TX0VETRDMM20XMQKU.exe, PE32 13->110 dropped 112 C:\Users\user\...\6VDSY4OVR4XW360ZEM.exe, PE32 13->112 dropped 174 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 13->174 176 Query firmware table information (likely to detect VMs) 13->176 178 Tries to harvest and steal ftp login credentials 13->178 184 3 other signatures 13->184 24 6VDSY4OVR4XW360ZEM.exe 13->24         started        28 KMFZ8B9P57TX0VETRDMM20XMQKU.exe 5 13->28         started        30 chrome.exe 13->30         started        39 4 other processes 13->39 180 Contains functionality to start a terminal service 18->180 33 conhost.exe 18->33         started        182 Found direct / indirect Syscall (likely to bypass EDR) 20->182 35 EduSphere.bat 22->35         started        37 conhost.exe 22->37         started        file6 signatures7 process8 dnsIp9 100 C:\Users\user\AppData\Local\...\nsExec.dll, PE32 24->100 dropped 154 Antivirus detection for dropped file 24->154 156 Multi AV Scanner detection for dropped file 24->156 41 cmd.exe 24->41         started        102 C:\Users\user\AppData\Local\...\Fwkdagwk.exe, PE32 28->102 dropped 158 Contains functionality to start a terminal service 28->158 160 Contains functionality to inject code into remote processes 28->160 44 Fwkdagwk.exe 1 28->44         started        46 conhost.exe 28->46         started        136 192.168.2.5, 138, 39001, 39002 unknown unknown 30->136 48 chrome.exe 30->48         started        51 chrome.exe 30->51         started        53 chrome.exe 39->53         started        55 chrome.exe 39->55         started        file10 signatures11 process12 dnsIp13 162 Detected CypherIt Packer 41->162 164 Drops PE files with a suspicious file extension 41->164 57 cmd.exe 41->57         started        60 conhost.exe 41->60         started        166 Multi AV Scanner detection for dropped file 44->166 168 Contains functionality to start a terminal service 44->168 62 conhost.exe 44->62         started        114 ogads-pa.clients6.google.com 142.250.217.138, 443, 49700, 49702 GOOGLEUS United States 48->114 116 www.google.com 142.250.72.132, 443, 49691, 49694 GOOGLEUS United States 48->116 122 3 other IPs or domains 48->122 118 142.251.40.42, 443, 49717, 49718 GOOGLEUS United States 53->118 120 play.google.com 53->120 signatures14 process15 file16 104 C:\Users\user\AppData\...\Individuals.pif, PE32+ 57->104 dropped 64 Individuals.pif 57->64         started        68 tasklist.exe 57->68         started        70 findstr.exe 57->70         started        72 3 other processes 57->72 process17 file18 94 C:\Users\user\AppData\Local\...\RegAsm.exe, PE32+ 64->94 dropped 96 C:\Users\user\AppData\Local\...duSphere.bat, PE32+ 64->96 dropped 98 C:\Users\user\AppData\Local\...duSphere.lnk, MS 64->98 dropped 138 Writes to foreign memory regions 64->138 140 Injects a PE file into a foreign processes 64->140 142 Found direct / indirect Syscall (likely to bypass EDR) 64->142 74 RegAsm.exe 64->74         started        79 cmd.exe 64->79         started        81 cmd.exe 64->81         started        signatures19 process20 dnsIp21 130 cnr.microsoft-telemetry.cc 195.10.205.165, 39001, 39002, 39003 TSSCOM-ASRU Russian Federation 74->130 106 C:\Users\user\AppData\...\ucnijpjlgb.exe, PE32 74->106 dropped 170 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 74->170 83 ucnijpjlgb.exe 74->83         started        172 Uses schtasks.exe or at.exe to add and modify task schedules 79->172 86 conhost.exe 79->86         started        88 schtasks.exe 79->88         started        108 C:\Users\user\AppData\...duSphere.url, MS 81->108 dropped 90 conhost.exe 81->90         started        file22 signatures23 process24 signatures25 152 Multi AV Scanner detection for dropped file 83->152 92 conhost.exe 83->92         started        process26
Verdict:
inconclusive
YARA:
3 match(es)
Tags:
Executable PE (Portable Executable) PE File Layout Win 32 Exe x86
Threat name:
Win32.Trojan.LummaStealer
Status:
Malicious
First seen:
2025-09-11 13:15:09 UTC
File Type:
PE (Exe)
AV detection:
27 of 38 (71.05%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:lumma discovery spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
System Location Discovery: System Language Discovery
Checks installed software on the system
Reads user/profile data of local email clients
Lumma Stealer, LummaC
Lumma family
Malware Config
C2 Extraction:
https://consnbx.su/sawo
https://diadtuky.su/texz
https://sirhirssg.su/xzde
https://prebwle.su/xazd
https://rhussois.su/tatr
https://todoexy.su/xqts
https://acrislegt.su/tazd
https://averiryvx.su/zadr
https://cerasatvf.su/qtpd
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
2a2b75810cfd40cd803149592adbc5ae85d7a1c5f91a3cfa3c1593a1f84381c8
MD5 hash:
0c1a88f4d59cc9dcb511e1b6da9409d8
SHA1 hash:
b5276b1931d9c3f02df4cdf47122d343435cf12d
SH256 hash:
f562c6a1260eebc78b02577843aed9bb60467836a3182518412e36a9069773f1
MD5 hash:
8870d3a8c99a88ee974dc3aca9cc6bd7
SHA1 hash:
7ed22447a38285733d8f62c24cced65cacae8561
Detections:
LummaStealer
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:CP_AllMal_Detector
Author:DiegoAnalytics
Description:CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:NET
Author:malware-lu
Rule name:pe_detect_tls_callbacks
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:win_lumma_generic
Author:dubfib

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments