MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3a97a7fc9f3ba2e678694a42d704bbc75ae15b81790d78cc18e27761ecb3a8d3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LummaStealer


Vendor detections: 14


Intelligence 14 IOCs YARA 6 File information Comments

SHA256 hash: 3a97a7fc9f3ba2e678694a42d704bbc75ae15b81790d78cc18e27761ecb3a8d3
SHA3-384 hash: 34d2238d4f10a502d52997eb0d134884f398477bfb7db75d458b99b41c78861eb7a1d9926b87e59db6e3d6e4b2402eec
SHA1 hash: baaff58e47a168b45ea4284338263065fc5826ff
MD5 hash: 6086c2c27043a6e017f55556c3356747
humanhash: black-queen-october-six
File name:random.exe
Download: download sample
Signature LummaStealer
File size:1'883'136 bytes
First seen:2025-01-18 17:22:00 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 2eabe9054cad5152567f0699947a2c5b (2'852 x LummaStealer, 1'312 x Stealc, 1'026 x Healer)
ssdeep 49152:LGBfmlO7hDMTUz9Bn14UGiq9e8cZEkuugHKDEbvYSksJ:LG42hAQz954exEkuuSzbviU
TLSH T18E9533477C1A3A9DC17E5033222F1641BE2D4712649FED78EE816633E62B8CB61F6819
TrID 42.7% (.EXE) Win32 Executable (generic) (4504/4/1)
19.2% (.EXE) OS/2 Executable (generic) (2029/13)
19.0% (.EXE) Generic Win/DOS Executable (2002/3)
18.9% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
Reporter aachum
Tags:exe LummaStealer


Avatar
iamaachum
185.215.113.16/luma/random.exe

Lumma C2: https://voyageprivato.bond/api

Intelligence


File Origin
# of uploads :
1
# of downloads :
78
Origin country :
ES ES
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
59REB_random.exe
Verdict:
Malicious activity
Analysis date:
2025-01-18 17:13:40 UTC
Tags:
amadey botnet stealer lumma loader stealc themida

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
97.4%
Tags:
autorun cobalt
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Searching for analyzing tools
Searching for the window
DNS request
Connection attempt
Sending a custom TCP request
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed packed packer_detected
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Amadey, LummaC Stealer, Stealc
Detection:
malicious
Classification:
phis.troj.spyw.evad
Score:
100 / 100
Signature
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
Creates HTA files
Detected unpacking (changes PE section rights)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Potentially malicious time measurement code found
Powershell drops PE file
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell download and execute file
Sigma detected: PowerShell DownloadFile
Sigma detected: Schtasks Creation Or Modification With SYSTEM Privileges
Sigma detected: Suspicious MSHTA Child Process
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to download and execute files (via powershell)
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Amadey
Yara detected Amadeys stealer DLL
Yara detected LummaC Stealer
Yara detected obfuscated html page
Yara detected Powershell download and execute
Yara detected Stealc
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1594295 Sample: random.exe Startdate: 18/01/2025 Architecture: WINDOWS Score: 100 129 rentry.co 2->129 131 voyageprivato.bond 2->131 133 11 other IPs or domains 2->133 145 Suricata IDS alerts for network traffic 2->145 147 Found malware configuration 2->147 149 Antivirus detection for URL or domain 2->149 153 22 other signatures 2->153 11 random.exe 2 2->11         started        16 skotes.exe 1 22 2->16         started        18 cmd.exe 2->18         started        20 8 other processes 2->20 signatures3 151 Connects to a pastebin service (likely for C&C) 129->151 process4 dnsIp5 137 185.215.113.16, 49748, 49967, 49985 WHOLESALECONNECTIONSNL Portugal 11->137 139 voyageprivato.bond 104.21.32.1, 443, 49699, 49700 CLOUDFLARENETUS United States 11->139 115 C:\Users\...\QK6LWEP0DE5D5VZ22EXZ7AY7OH6.exe, PE32 11->115 dropped 117 C:\Users\...\90K3LNPSZO2AHSV11F2FEICCUM3C.exe, PE32 11->117 dropped 207 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 11->207 209 Query firmware table information (likely to detect VMs) 11->209 211 Found many strings related to Crypto-Wallets (likely being stolen) 11->211 223 5 other signatures 11->223 22 QK6LWEP0DE5D5VZ22EXZ7AY7OH6.exe 4 11->22         started        26 90K3LNPSZO2AHSV11F2FEICCUM3C.exe 13 11->26         started        141 185.215.113.43, 49945, 49961, 49981 WHOLESALECONNECTIONSNL Portugal 16->141 143 185.215.113.39, 50016, 50018, 80 WHOLESALECONNECTIONSNL Portugal 16->143 119 C:\Users\user\AppData\...\8bf3c6743d.exe, PE32 16->119 dropped 121 C:\Users\user\AppData\...\2e08a1070b.exe, PE32 16->121 dropped 123 C:\Users\user\AppData\Local\...\random[1].exe, PE32 16->123 dropped 125 C:\Users\user\AppData\Local\...\random[1].exe, PE32 16->125 dropped 213 Hides threads from debuggers 16->213 215 Tries to detect sandboxes / dynamic malware analysis system (registry check) 16->215 217 Tries to detect process monitoring tools (Task Manager, Process Explorer etc.) 16->217 29 cmd.exe 1 16->29         started        31 cmd.exe 18->31         started        33 conhost.exe 18->33         started        219 Suspicious powershell command line found 20->219 221 Tries to download and execute files (via powershell) 20->221 35 cmd.exe 20->35         started        37 powershell.exe 20->37         started        39 powershell.exe 20->39         started        41 5 other processes 20->41 file6 signatures7 process8 dnsIp9 109 C:\Users\user\AppData\Local\...\skotes.exe, PE32 22->109 dropped 171 Antivirus detection for dropped file 22->171 173 Multi AV Scanner detection for dropped file 22->173 175 Detected unpacking (changes PE section rights) 22->175 187 4 other signatures 22->187 43 skotes.exe 22->43         started        135 185.215.113.206, 49798, 80 WHOLESALECONNECTIONSNL Portugal 26->135 177 Machine Learning detection for dropped file 26->177 179 Tries to evade debugger and weak emulator (self modifying code) 26->179 181 Tries to detect virtualization through RDTSC time measurements 26->181 183 Uses schtasks.exe or at.exe to add and modify task schedules 29->183 46 cmd.exe 3 29->46         started        49 conhost.exe 29->49         started        111 C:\Temp\pSoyt8G0O.hta, HTML 31->111 dropped 185 Creates HTA files 31->185 51 mshta.exe 31->51         started        53 8 other processes 31->53 113 C:\Temp\8nMk16jcE.hta, HTML 35->113 dropped 55 9 other processes 35->55 57 2 other processes 37->57 59 2 other processes 39->59 61 6 other processes 41->61 file10 signatures11 process12 file13 189 Multi AV Scanner detection for dropped file 43->189 191 Detected unpacking (changes PE section rights) 43->191 193 Tries to evade debugger and weak emulator (self modifying code) 43->193 127 C:\Temp\ZudcVhYxT.hta, HTML 46->127 dropped 195 Creates HTA files 46->195 63 mshta.exe 46->63         started        66 cmd.exe 1 46->66         started        68 cmd.exe 46->68         started        76 7 other processes 46->76 197 Suspicious powershell command line found 51->197 199 Tries to download and execute files (via powershell) 51->199 70 powershell.exe 51->70         started        72 powershell.exe 53->72         started        78 4 other processes 53->78 74 powershell.exe 55->74         started        80 5 other processes 55->80 201 Hides threads from debuggers 61->201 203 Tries to detect sandboxes / dynamic malware analysis system (registry check) 61->203 205 Tries to detect process monitoring tools (Task Manager, Process Explorer etc.) 61->205 signatures14 process15 signatures16 225 Suspicious powershell command line found 63->225 227 Tries to download and execute files (via powershell) 63->227 82 powershell.exe 63->82         started        85 powershell.exe 15 66->85         started        88 powershell.exe 68->88         started        90 483d2fa8a0d53818306efeb32d3.exe 70->90         started        92 conhost.exe 70->92         started        94 483d2fa8a0d53818306efeb32d3.exe 74->94         started        96 conhost.exe 74->96         started        98 powershell.exe 76->98         started        100 2 other processes 76->100 process17 file18 107 C:\Users\...\483d2fa8a0d53818306efeb32d3.exe, PE32 82->107 dropped 102 483d2fa8a0d53818306efeb32d3.exe 82->102         started        105 conhost.exe 82->105         started        155 Powershell drops PE file 85->155 157 Hides threads from debuggers 90->157 159 Tries to detect sandboxes / dynamic malware analysis system (registry check) 90->159 161 Tries to detect process monitoring tools (Task Manager, Process Explorer etc.) 90->161 signatures19 process20 signatures21 163 Antivirus detection for dropped file 102->163 165 Multi AV Scanner detection for dropped file 102->165 167 Detected unpacking (changes PE section rights) 102->167 169 7 other signatures 102->169
Threat name:
Win32.Trojan.LummaStealer
Status:
Malicious
First seen:
2025-01-18 17:13:41 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
18 of 38 (47.37%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
discovery evasion
Behaviour
Suspicious behavior: EnumeratesProcesses
System Location Discovery: System Language Discovery
Suspicious use of NtSetInformationThreadHideFromDebugger
Checks BIOS information in registry
Identifies Wine through registry keys
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Unpacked files
SH256 hash:
8758e9199deab8fa1d197eb99df36e8fbef26cd33dae33453c5bffb5bfe21e16
MD5 hash:
908e43ca52dcb63bb873d41241a03739
SHA1 hash:
1228e91be979fd8bc5b8caf739cda45347cef87d
SH256 hash:
3a97a7fc9f3ba2e678694a42d704bbc75ae15b81790d78cc18e27761ecb3a8d3
MD5 hash:
6086c2c27043a6e017f55556c3356747
SHA1 hash:
baaff58e47a168b45ea4284338263065fc5826ff
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Lumma
Author:kevoreilly
Description:Lumma Payload
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques
Rule name:Windows_Trojan_Lumma_4ad749b0
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

LummaStealer

Executable exe 3a97a7fc9f3ba2e678694a42d704bbc75ae15b81790d78cc18e27761ecb3a8d3

(this sample)

  
Dropped by
Amadey
  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
CHECK_NXMissing Non-Executable Memory Protectioncritical

Comments