MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 67762d49ebdd5e7142ff8e932bea77a380ce989db5afe5219dfaa8bfc85cf50d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LummaStealer


Vendor detections: 14


Intelligence 14 IOCs YARA 1 File information Comments

SHA256 hash: 67762d49ebdd5e7142ff8e932bea77a380ce989db5afe5219dfaa8bfc85cf50d
SHA3-384 hash: 0d0c5a05d9849179cf69fd7ce6a4f66a943100cae8d857f15fce15412fce69869d50ac63068fb70dd836e301c4b6bd32
SHA1 hash: dca9fd2c3cee097e2c91d3d6d6472fbb6063ab01
MD5 hash: 1ca089501b508ed71e4ec0d1222d0c96
humanhash: juliet-quebec-muppet-burger
File name:1ca089501b508ed71e4ec0d1222d0c96.exe
Download: download sample
Signature LummaStealer
File size:2'060'800 bytes
First seen:2025-06-12 09:14:56 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 2eabe9054cad5152567f0699947a2c5b (2'852 x LummaStealer, 1'312 x Stealc, 1'026 x Healer)
ssdeep 49152:OM7qQWRKfwuMyUIxWmdm1Hr0T04iZHEQN1Kkk16/sqcM:1q3ROjUIxWhx0K3C116/hc
TLSH T11795025E29A9E50CD03E19F401E267B99151EF6E2B27B325D3E34AB504307953BE0FB2
TrID 42.7% (.EXE) Win32 Executable (generic) (4504/4/1)
19.2% (.EXE) OS/2 Executable (generic) (2029/13)
19.0% (.EXE) Generic Win/DOS Executable (2002/3)
18.9% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
Reporter abuse_ch
Tags:exe LummaStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
438
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
1ca089501b508ed71e4ec0d1222d0c96.exe
Verdict:
Malicious activity
Analysis date:
2025-06-12 09:34:56 UTC
Tags:
lumma stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
91.7%
Tags:
phishing virus xpack
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Searching for analyzing tools
Searching for the window
Connection attempt to an infection source
DNS request
Connection attempt
Sending an HTTP GET request
Using the Windows Management Instrumentation requests
Query of malicious DNS domain
Sending a TCP request to an infection source
Result
Threat name:
Amadey, LummaC Stealer
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Contains functionality to start a terminal service
Detected unpacking (changes PE section rights)
Drops password protected ZIP file
Found API chain indicative of sandbox detection
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Joe Sandbox ML detected suspicious sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: PUA - NSudo Execution
Suricata IDS alerts for network traffic
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal from password manager
Uses cmd line tools excessively to alter registry or file data
Uses schtasks.exe or at.exe to add and modify task schedules
Uses the nircmd tool (NirSoft)
Yara detected Amadey
Yara detected Amadeys Clipper DLL
Yara detected LummaC Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1713028 Sample: p5JI0zx8rY.exe Startdate: 12/06/2025 Architecture: WINDOWS Score: 100 124 185.156.72.96 ITDELUXE-ASRU Russian Federation 2->124 126 battlefled.top 2->126 132 Suricata IDS alerts for network traffic 2->132 134 Found malware configuration 2->134 136 Antivirus / Scanner detection for submitted sample 2->136 138 14 other signatures 2->138 12 p5JI0zx8rY.exe 1 2->12         started        17 Mm7d0374.exe 2->17         started        19 ramez.exe 2->19         started        21 2 other processes 2->21 signatures3 process4 dnsIp5 128 185.156.72.2, 49699, 80 ITDELUXE-ASRU Russian Federation 12->128 130 battlefled.top 195.82.147.188, 443, 49692, 49693 DREAMTORRENT-CORP-ASRU Russian Federation 12->130 118 C:\Users\user\...\JEML2B86U7LVHFFX4SID.exe, PE32 12->118 dropped 178 Detected unpacking (changes PE section rights) 12->178 180 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 12->180 182 Query firmware table information (likely to detect VMs) 12->182 192 8 other signatures 12->192 23 JEML2B86U7LVHFFX4SID.exe 8 12->23         started        26 WerFault.exe 19 16 12->26         started        184 Binary is likely a compiled AutoIt script file 17->184 28 pk3GC1E2.exe 17->28         started        31 1c1dHzvh.exe 17->31         started        33 cmd.exe 17->33         started        35 cmd.exe 17->35         started        186 Contains functionality to start a terminal service 19->186 188 Hides threads from debuggers 19->188 190 Tries to detect sandboxes / dynamic malware analysis system (registry check) 19->190 37 Conhost.exe 19->37         started        39 WerFault.exe 2 21->39         started        file6 signatures7 process8 file9 112 C:\Users\user\profile\Mm7d0374.exe, PE32 23->112 dropped 114 C:\Users\user\profile\1f1ojbP0.exe, PE32 23->114 dropped 41 Mm7d0374.exe 23->41         started        116 C:\ProgramData\Microsoft\...\Report.wer, Unicode 26->116 dropped 170 Contains functionality to start a terminal service 28->170 172 Hides threads from debuggers 28->172 174 Tries to detect sandboxes / dynamic malware analysis system (registry check) 28->174 176 Tries to detect process monitoring tools (Task Manager, Process Explorer etc.) 28->176 44 cmd.exe 31->44         started        46 1f1ojbP0.exe 33->46         started        48 conhost.exe 33->48         started        50 conhost.exe 35->50         started        52 schtasks.exe 35->52         started        signatures10 process11 signatures12 154 Binary is likely a compiled AutoIt script file 41->154 156 Found API chain indicative of sandbox detection 41->156 54 pk3GC1E2.exe 4 41->54         started        58 1c1dHzvh.exe 41->58         started        60 cmd.exe 1 41->60         started        62 cmd.exe 41->62         started        158 Uses cmd line tools excessively to alter registry or file data 44->158 64 conhost.exe 44->64         started        66 nircmd.exe 44->66         started        68 chcp.com 44->68         started        70 reg.exe 44->70         started        72 Conhost.exe 46->72         started        process13 file14 102 C:\Users\user\AppData\Local\...\ramez.exe, PE32 54->102 dropped 140 Antivirus detection for dropped file 54->140 142 Detected unpacking (changes PE section rights) 54->142 144 Contains functionality to start a terminal service 54->144 152 5 other signatures 54->152 74 ramez.exe 54->74         started        104 C:\Users\user\AppData\Local\...\nircmd.exe, PE32+ 58->104 dropped 106 C:\Users\user\AppData\Local\...\cecho.exe, PE32 58->106 dropped 108 C:\Users\user\AppData\Local\...108SudoLG.exe, PE32+ 58->108 dropped 110 2 other malicious files 58->110 dropped 77 cmd.exe 58->77         started        146 Uses cmd line tools excessively to alter registry or file data 60->146 148 Uses schtasks.exe or at.exe to add and modify task schedules 60->148 150 Uses the nircmd tool (NirSoft) 60->150 79 1f1ojbP0.exe 3 60->79         started        82 conhost.exe 60->82         started        84 conhost.exe 62->84         started        86 schtasks.exe 62->86         started        signatures15 process16 file17 160 Antivirus detection for dropped file 74->160 162 Detected unpacking (changes PE section rights) 74->162 164 Contains functionality to start a terminal service 74->164 168 5 other signatures 74->168 166 Uses cmd line tools excessively to alter registry or file data 77->166 88 cmd.exe 77->88         started        90 cmd.exe 77->90         started        92 conhost.exe 77->92         started        96 17 other processes 77->96 120 C:\Users\user\profile\pk3GC1E2.exe, PE32 79->120 dropped 122 C:\Users\user\profile\1c1dHzvh.exe, PE32 79->122 dropped 94 Conhost.exe 79->94         started        signatures18 process19 process20 98 Conhost.exe 88->98         started        100 tasklist.exe 90->100         started       
Threat name:
Win32.Trojan.Symmi
Status:
Malicious
First seen:
2025-06-11 18:56:00 UTC
AV detection:
18 of 24 (75.00%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
lummastealer
Similar samples:
Result
Malware family:
Score:
  10/10
Tags:
family:lumma defense_evasion discovery spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
System Location Discovery: System Language Discovery
Suspicious use of NtSetInformationThreadHideFromDebugger
Checks installed software on the system
Checks BIOS information in registry
Identifies Wine through registry keys
Reads user/profile data of local email clients
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Lumma Stealer, LummaC
Lumma family
Malware Config
C2 Extraction:
https://battlefled.top/gaoi
https://narrathfpt.top/tekq
https://escczlv.top/bufi
https://localixbiw.top/zlpa
https://korxddl.top/qidz
https://stochalyqp.xyz/alfp
https://diecam.top/laur/api
https://citellcagt.top/gjtu
https://peppinqikp.xyz/xaow
Unpacked files
SH256 hash:
67762d49ebdd5e7142ff8e932bea77a380ce989db5afe5219dfaa8bfc85cf50d
MD5 hash:
1ca089501b508ed71e4ec0d1222d0c96
SHA1 hash:
dca9fd2c3cee097e2c91d3d6d6472fbb6063ab01
SH256 hash:
b9721bd73f458507be40dd4805bba8b8322fb669d59543a760d2094550555316
MD5 hash:
1d7e9c073d9621ca736f9b599631062a
SHA1 hash:
7c6bf5f3fe07eb900cf2cb72d49eab5b118f1be5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
CHECK_NXMissing Non-Executable Memory Protectioncritical

Comments