MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7bc1711f4f63af05c5a79a1a853dce8efa245a775e4714f6e8188c7d1d26328f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LummaStealer


Vendor detections: 16


Intelligence 16 IOCs YARA 1 File information Comments

SHA256 hash: 7bc1711f4f63af05c5a79a1a853dce8efa245a775e4714f6e8188c7d1d26328f
SHA3-384 hash: 154f89e9dd988a980edb8445b63b24db848b5df01a68fcbd78622a9ce00e73e14441d31e8726ba9b56ed70a8eaf0637c
SHA1 hash: 8fb175e1801d21f16e1a595c9ae57af5ca70a27b
MD5 hash: 2c371eb1e131c6869c69619e1eaacaa7
humanhash: gee-bravo-arizona-may
File name:random.exe
Download: download sample
Signature LummaStealer
File size:1'907'712 bytes
First seen:2025-04-17 14:27:28 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 2eabe9054cad5152567f0699947a2c5b (2'852 x LummaStealer, 1'312 x Stealc, 1'026 x Healer)
ssdeep 49152:VTa2sIz+vT7T10xki7RiT55U+nA1jJBLVT2cBCn1BQEKCjZj9tnta/FI2:q3L7xwki7RiTMtv7XJCFJtOy2
Threatray 3 similar samples on MalwareBazaar
TLSH T1AD9533289D66E190F7A9AEF806E1464F2F149E645231C502BF472F33D8F66A86F5B130
TrID 42.7% (.EXE) Win32 Executable (generic) (4504/4/1)
19.2% (.EXE) OS/2 Executable (generic) (2029/13)
19.0% (.EXE) Generic Win/DOS Executable (2002/3)
18.9% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
Reporter abuse_ch
Tags:exe LummaStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
487
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
random.exe
Verdict:
Malicious activity
Analysis date:
2025-04-17 12:54:48 UTC
Tags:
lumma stealer loader amadey botnet credentialflusher rdp auto-reg themida

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
infosteal autorun emotet spam
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Searching for analyzing tools
Connection attempt to an infection source
Using the Windows Management Instrumentation requests
Query of malicious DNS domain
Sending a TCP request to an infection source
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed packed packer_detected
Result
Threat name:
Amadey, LummaC Stealer, PrivateLoader
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to start a terminal service
Creates a thread in another existing process (thread injection)
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Found malware configuration
Hides threads from debuggers
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Modifies windows update settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: New RUN Key Pointing to Suspicious Folder
Suricata IDS alerts for network traffic
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Yara detected Amadey
Yara detected Amadeys Clipper DLL
Yara detected LummaC Stealer
Yara detected PrivateLoader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1667643 Sample: random.exe Startdate: 17/04/2025 Architecture: WINDOWS Score: 100 123 api.telegram.org 2->123 125 revitmodh.run 2->125 127 39 other IPs or domains 2->127 157 Suricata IDS alerts for network traffic 2->157 159 Found malware configuration 2->159 161 Malicious sample detected (through community Yara rule) 2->161 165 14 other signatures 2->165 10 namez.exe 7 42 2->10         started        15 random.exe 1 2->15         started        17 msiexec.exe 2->17         started        19 4 other processes 2->19 signatures3 163 Uses the Telegram API (likely for C&C communication) 123->163 process4 dnsIp5 129 185.215.113.59, 49703, 49704, 49706 WHOLESALECONNECTIONSNL Portugal 10->129 105 C:\Users\user\AppData\Local\...\LAc2heq.exe, PE32+ 10->105 dropped 107 C:\Users\user\AppData\Local\...\zdZK6Nx.exe, PE32 10->107 dropped 109 C:\Users\user\AppData\Local\...\w4XreDy.exe, PE32+ 10->109 dropped 121 16 other malicious files 10->121 dropped 203 Contains functionality to start a terminal service 10->203 205 Creates multiple autostart registry keys 10->205 21 b9272e3ba1.exe 10->21         started        25 798fc8e6bc.exe 10->25         started        27 c37a3a2560.exe 10->27         started        38 4 other processes 10->38 131 185.39.17.162, 49699, 49705, 49707 RU-TAGNET-ASRU Russian Federation 15->131 133 clarmodq.top 172.67.205.184, 443, 49692, 49693 CLOUDFLARENETUS United States 15->133 111 C:\Users\user\...\0CLO00S1XM5FY5CI0A.exe, PE32 15->111 dropped 207 Detected unpacking (changes PE section rights) 15->207 209 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 15->209 211 Query firmware table information (likely to detect VMs) 15->211 219 3 other signatures 15->219 29 0CLO00S1XM5FY5CI0A.exe 4 15->29         started        113 C:\Users\user\AppData\Local\...\nircmd.exe, PE32+ 17->113 dropped 115 C:\Users\user\AppData\Local\...\cecho.exe, PE32 17->115 dropped 117 C:\Users\user\AppData\Local\...117SudoLG.exe, PE32+ 17->117 dropped 119 C:\Users\user\AppData\Local\Temp\...\7z.exe, PE32 17->119 dropped 135 239.255.255.250 unknown Reserved 19->135 213 Hides threads from debuggers 19->213 215 Tries to detect sandboxes / dynamic malware analysis system (registry check) 19->215 217 Tries to detect process monitoring tools (Task Manager, Process Explorer etc.) 19->217 31 msedge.exe 19->31         started        34 msedge.exe 19->34         started        36 msedge.exe 19->36         started        file6 signatures7 process8 dnsIp9 79 C:\Users\user\AppData\...\b9272e3ba1.tmp, PE32 21->79 dropped 167 Multi AV Scanner detection for dropped file 21->167 40 b9272e3ba1.tmp 21->40         started        169 Detected unpacking (changes PE section rights) 25->169 171 Tries to detect sandboxes and other dynamic analysis tools (window names) 25->171 173 Modifies windows update settings 25->173 187 6 other signatures 25->187 81 C:\Users\...\0HFB3DOSGJRAS2ECQZ9M8FKVJCFT.exe, PE32 27->81 dropped 175 Query firmware table information (likely to detect VMs) 27->175 189 3 other signatures 27->189 83 C:\Users\user\AppData\Local\...\namez.exe, PE32 29->83 dropped 177 Contains functionality to start a terminal service 29->177 179 Contains functionality to inject code into remote processes 29->179 43 namez.exe 29->43         started        149 a233.dscd.akamai.net 23.34.82.12 SAUDINETSTC-ASSA United States 31->149 151 sb.scorecardresearch.com 18.160.71.36 MIT-GATEWAYSUS United States 31->151 155 35 other IPs or domains 31->155 85 C:\Users\user\AppData\Local\...\Cookies, SQLite 31->85 dropped 153 cdnnode-01.cfd 172.67.177.126, 443, 49708, 49709 CLOUDFLARENETUS United States 38->153 181 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 38->181 183 Tries to harvest and steal browser information (history, passwords, etc) 38->183 185 Writes to foreign memory regions 38->185 191 3 other signatures 38->191 46 chrome.exe 38->46         started        49 msedge.exe 38->49         started        51 taskkill.exe 38->51         started        53 taskkill.exe 38->53         started        file10 signatures11 process12 dnsIp13 89 C:\Users\user\AppData\...\unins000.exe (copy), PE32 40->89 dropped 91 C:\Users\user\AppData\...\is-QO4NO.tmp, PE32 40->91 dropped 93 C:\Users\user\AppData\...\is-MCM5V.tmp, PE32 40->93 dropped 95 6 other malicious files 40->95 dropped 55 KMSpico.exe 40->55         started        58 core.exe 40->58         started        62 info.exe 40->62         started        193 Multi AV Scanner detection for dropped file 43->193 195 Contains functionality to start a terminal service 43->195 147 192.168.2.5, 443, 49675, 49692 unknown unknown 46->147 64 chrome.exe 46->64         started        66 chrome.exe 46->66         started        68 msedge.exe 49->68         started        70 conhost.exe 51->70         started        72 conhost.exe 53->72         started        file14 signatures15 process16 dnsIp17 87 C:\Users\user\AppData\Local\...\KMSpico.tmp, PE32 55->87 dropped 74 KMSpico.tmp 55->74         started        137 changeaie.top 104.21.42.7 CLOUDFLARENETUS United States 58->137 197 Tries to harvest and steal ftp login credentials 58->197 199 Tries to harvest and steal browser information (history, passwords, etc) 58->199 201 Tries to steal Crypto Currency Wallets 58->201 139 stats-1.crabdance.com 82.115.223.212 MIDNET-ASTK-TelecomRU Russian Federation 62->139 77 conhost.exe 62->77         started        141 plus.l.google.com 142.251.15.101 GOOGLEUS United States 64->141 143 www.google.com 173.194.219.147, 443, 49718, 49721 GOOGLEUS United States 64->143 145 3 other IPs or domains 64->145 file18 signatures19 process20 file21 97 C:\Windows\...\Vestris.ResourceLib.dll (copy), PE32 74->97 dropped 99 C:\Windows\System32\is-ASEMH.tmp, PE32 74->99 dropped 101 C:\Windows\System32\is-1OP82.tmp, PE32 74->101 dropped 103 17 other malicious files 74->103 dropped
Threat name:
Win32.Trojan.LummaStealer
Status:
Malicious
First seen:
2025-04-17 14:28:22 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
21 of 24 (87.50%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:lumma defense_evasion discovery spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Browser Information Discovery
System Location Discovery: System Language Discovery
Suspicious use of NtSetInformationThreadHideFromDebugger
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Checks BIOS information in registry
Identifies Wine through registry keys
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Lumma Stealer, LummaC
Lumma family
Malware Config
C2 Extraction:
https://v8clarmodq.top/qoxo
https://piratetwrath.run/ytus
https://changeaie.top/geps
https://quilltayle.live/gksi
https://8liftally.top/xasj
https://nighetwhisper.top/lekd
https://salaccgfa.top/gsooz
https://zestmodp.top/zeda
https://starofliught.top/wozd
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
7bc1711f4f63af05c5a79a1a853dce8efa245a775e4714f6e8188c7d1d26328f
MD5 hash:
2c371eb1e131c6869c69619e1eaacaa7
SHA1 hash:
8fb175e1801d21f16e1a595c9ae57af5ca70a27b
SH256 hash:
bd2a69ff8d6c255c8ca353d7512c5221c44816d2281c98b8a41ae15393a6af68
MD5 hash:
0567af334d6b8bc60b0c67da5fd33181
SHA1 hash:
79c135f760adf974f1de7090bec170e37771db13
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

LummaStealer

Executable exe 7bc1711f4f63af05c5a79a1a853dce8efa245a775e4714f6e8188c7d1d26328f

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
CHECK_NXMissing Non-Executable Memory Protectioncritical

Comments