MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8064b05b68f87a7bf759983a0d614648fd61faf3f2465aabea0e6895c3432809. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LummaStealer


Vendor detections: 16


Intelligence 16 IOCs YARA 2 File information Comments

SHA256 hash: 8064b05b68f87a7bf759983a0d614648fd61faf3f2465aabea0e6895c3432809
SHA3-384 hash: 00cd2ad3fccaba4472e1db5060c98ef6854b82a7f6c2fa7df5a59d6567205f0fdde5cf3c8d32969de293dc2a4683b88b
SHA1 hash: 1573ebdcfa2a2d7669853084926e43d224374cd4
MD5 hash: fa0243bd6bcb90addc7a87f60519f771
humanhash: north-jupiter-spaghetti-red
File name:random.exe
Download: download sample
Signature LummaStealer
File size:1'884'672 bytes
First seen:2025-04-27 08:47:30 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 2eabe9054cad5152567f0699947a2c5b (2'852 x LummaStealer, 1'312 x Stealc, 1'026 x Healer)
ssdeep 49152:IwS0aX4X+GeyHbIhcbExOCW4n+riXmwauE:IvR40y7ScbUOCWO+riX
Threatray 1 similar samples on MalwareBazaar
TLSH T16D9533C1EF7DE256C0E8DA75AE5A17C138E12B9E4682F390532AE490BD476B1CC51CE1
TrID 42.7% (.EXE) Win32 Executable (generic) (4504/4/1)
19.2% (.EXE) OS/2 Executable (generic) (2029/13)
19.0% (.EXE) Generic Win/DOS Executable (2002/3)
18.9% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
Reporter abuse_ch
Tags:exe LummaStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
443
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
random.exe
Verdict:
Malicious activity
Analysis date:
2025-04-27 08:48:54 UTC
Tags:
lumma stealer themida loader amadey botnet telegram rdp

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
95.7%
Tags:
vmdetect phishing autorun
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Searching for analyzing tools
Connection attempt to an infection source
Using the Windows Management Instrumentation requests
Query of malicious DNS domain
Sending a TCP request to an infection source
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm crypt entropy packed packed packer_detected rat virtual xpack
Result
Threat name:
Amadey, Credential Flusher, Healer AV Di
Detection:
malicious
Classification:
phis.troj.spyw.evad.mine
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to start a terminal service
Creates HTA files
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Found malware configuration
Hides threads from debuggers
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Modifies windows update settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Powershell drops PE file
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell download and execute file
Sigma detected: PowerShell DownloadFile
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Silenttrinity Stager Msbuild Activity
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious Script Execution From Temp Folder
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to download and execute files (via powershell)
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal from password manager
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadey
Yara detected Amadeys Clipper DLL
Yara detected Credential Flusher
Yara detected Healer AV Disabler
Yara detected LummaC Stealer
Yara detected obfuscated html page
Yara detected Powershell download and execute
Yara detected RedLine Stealer
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1675427 Sample: random.exe Startdate: 27/04/2025 Architecture: WINDOWS Score: 100 99 zestmodp.top 2->99 101 youtube.com 2->101 103 53 other IPs or domains 2->103 135 Suricata IDS alerts for network traffic 2->135 137 Found malware configuration 2->137 139 Antivirus detection for URL or domain 2->139 141 27 other signatures 2->141 10 saved.exe 4 56 2->10         started        15 random.exe 1 2->15         started        17 1508515eb5.exe 2->17         started        19 5 other processes 2->19 signatures3 process4 dnsIp5 105 185.39.17.163, 49729, 49730, 49733 RU-TAGNET-ASRU Russian Federation 10->105 107 185.215.113.30 WHOLESALECONNECTIONSNL Portugal 10->107 85 C:\Users\user\AppData\...\5142a471ab.exe, PE32 10->85 dropped 87 C:\Users\user\AppData\...\3a00532a55.exe, PE32 10->87 dropped 89 C:\Users\user\AppData\Local\...\JLVnvnZ.exe, PE32+ 10->89 dropped 95 21 other malicious files 10->95 dropped 189 Contains functionality to start a terminal service 10->189 191 Creates multiple autostart registry keys 10->191 21 1508515eb5.exe 1 10->21         started        25 bd1117f9c6.exe 9 1 10->25         started        27 6755ea1dc8.exe 10->27         started        38 2 other processes 10->38 109 185.39.17.162, 49726, 49731, 49735 RU-TAGNET-ASRU Russian Federation 15->109 111 clarmodq.top 172.67.205.184, 443, 49714, 49715 CLOUDFLARENETUS United States 15->111 91 C:\Users\...\HAIBOFN1NMIZ54JH7BGYSH3HQ4RL.exe, PE32 15->91 dropped 193 Detected unpacking (changes PE section rights) 15->193 195 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 15->195 197 Query firmware table information (likely to detect VMs) 15->197 211 2 other signatures 15->211 29 HAIBOFN1NMIZ54JH7BGYSH3HQ4RL.exe 4 15->29         started        93 C:\Users\...\TSZ2WY17Q0XLPWWCQKGON6SYP.exe, PE32 17->93 dropped 199 Tries to steal Crypto Currency Wallets 17->199 201 Hides threads from debuggers 17->201 203 Tries to detect sandboxes / dynamic malware analysis system (registry check) 17->203 31 chrome.exe 17->31         started        34 chrome.exe 17->34         started        205 Suspicious powershell command line found 19->205 207 Tries to download and execute files (via powershell) 19->207 209 Tries to detect process monitoring tools (Task Manager, Process Explorer etc.) 19->209 36 firefox.exe 19->36         started        40 2 other processes 19->40 file6 signatures7 process8 dnsIp9 79 C:\Users\...\FXLZAKIFBBJOE8OFR14HT9E88RI.exe, PE32 21->79 dropped 143 Antivirus detection for dropped file 21->143 145 Detected unpacking (changes PE section rights) 21->145 147 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 21->147 163 7 other signatures 21->163 42 FXLZAKIFBBJOE8OFR14HT9E88RI.exe 21->42         started        149 Tries to detect sandboxes and other dynamic analysis tools (window names) 25->149 151 Modifies windows update settings 25->151 165 3 other signatures 25->165 153 Multi AV Scanner detection for dropped file 27->153 167 3 other signatures 27->167 45 MSBuild.exe 27->45         started        81 C:\Users\user\AppData\Local\...\saved.exe, PE32 29->81 dropped 155 Contains functionality to start a terminal service 29->155 157 Contains functionality to inject code into remote processes 29->157 48 saved.exe 29->48         started        127 192.168.2.4, 443, 49708, 49710 unknown unknown 31->127 50 chrome.exe 31->50         started        52 chrome.exe 34->52         started        129 prod.detectportal.prod.cloudops.mozgcp.net 34.107.221.82, 49792, 80 GOOGLEUS United States 36->129 131 prod.classify-client.prod.webservices.mozgcp.net 35.190.72.216, 443, 49760 GOOGLEUS United States 36->131 133 127.0.0.1 unknown unknown 36->133 56 2 other processes 36->56 83 C:\Users\user\AppData\Local\...\dcgH7UNvf.hta, HTML 38->83 dropped 159 Binary is likely a compiled AutoIt script file 38->159 161 Creates HTA files 38->161 54 mshta.exe 38->54         started        58 7 other processes 38->58 60 2 other processes 40->60 file10 signatures11 process12 dnsIp13 113 t.me 149.154.167.99, 443, 49797 TELEGRAMRU United Kingdom 45->113 115 techwaveg.run 104.21.58.253, 443, 49801 CLOUDFLARENETUS United States 45->115 169 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 45->169 171 Query firmware table information (likely to detect VMs) 45->171 173 Tries to harvest and steal ftp login credentials 45->173 185 3 other signatures 45->185 175 Multi AV Scanner detection for dropped file 48->175 177 Contains functionality to start a terminal service 48->177 117 142.250.69.4, 443, 49765, 49766 GOOGLEUS United States 50->117 119 142.250.72.132, 443, 49775, 49776 GOOGLEUS United States 50->119 125 9 other IPs or domains 50->125 121 www.google.com 142.250.189.4, 443, 49750, 49751 GOOGLEUS United States 52->121 123 youtube.com 192.178.49.174, 443, 49746, 49749 GOOGLEUS United States 52->123 179 Suspicious powershell command line found 54->179 181 Tries to download and execute files (via powershell) 54->181 62 powershell.exe 54->62         started        183 Uses schtasks.exe or at.exe to add and modify task schedules 58->183 66 conhost.exe 58->66         started        68 conhost.exe 58->68         started        70 conhost.exe 58->70         started        72 4 other processes 58->72 signatures14 process15 file16 97 TempPGQ32XRZJDFQX5AOBKW8JWXRCDEHTLDO.EXE, PE32 62->97 dropped 213 Powershell drops PE file 62->213 74 TempPGQ32XRZJDFQX5AOBKW8JWXRCDEHTLDO.EXE 62->74         started        77 conhost.exe 62->77         started        signatures17 process18 signatures19 187 Multi AV Scanner detection for dropped file 74->187
Threat name:
Win32.Trojan.Kepavll
Status:
Malicious
First seen:
2025-04-26 21:26:11 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
19 of 24 (79.17%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:lumma defense_evasion discovery spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
System Location Discovery: System Language Discovery
Suspicious use of NtSetInformationThreadHideFromDebugger
Checks installed software on the system
Checks BIOS information in registry
Identifies Wine through registry keys
Reads user/profile data of local email clients
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Lumma Stealer, LummaC
Lumma family
Malware Config
C2 Extraction:
https://clarmodq.top/qoxo
https://geographys.run/eirq
https://woodpeckersd.run/glsk
https://tropiscbs.live/iuwxx
https://cartograhphy.top/ixau
https://biosphxere.digital/tqoa
https://topographky.top/xlak
https://climatologfy.top/kbud
https://vigorbridgoe.top/banb
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
8064b05b68f87a7bf759983a0d614648fd61faf3f2465aabea0e6895c3432809
MD5 hash:
fa0243bd6bcb90addc7a87f60519f771
SHA1 hash:
1573ebdcfa2a2d7669853084926e43d224374cd4
SH256 hash:
7f8afd2bd752c5217d436195fa6e1e348c0705973ef6fa049bf7b8b3c9b44aba
MD5 hash:
98daa9775748e24206d649ab535d15fc
SHA1 hash:
587171a3a39ef9f9838abfb507d6bcf70e302008
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

LummaStealer

Executable exe 8064b05b68f87a7bf759983a0d614648fd61faf3f2465aabea0e6895c3432809

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
CHECK_NXMissing Non-Executable Memory Protectioncritical

Comments