MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9e54445c35f5c02a9a97f95a4207457e36a94fc9e884b810d990f7d4b23bd6fd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LummaStealer


Vendor detections: 16


Intelligence 16 IOCs YARA 11 File information Comments

SHA256 hash: 9e54445c35f5c02a9a97f95a4207457e36a94fc9e884b810d990f7d4b23bd6fd
SHA3-384 hash: b794a339e037f074b522a2759a3d2855be049285db33ac4f303e5eb7bd6e63485ded2da351514e1b43f4c70682f153cb
SHA1 hash: 9adf1f481f63d66522dbcb9af6a71010b360b577
MD5 hash: 39a32e3966c155109b9e617a60380c02
humanhash: wisconsin-spaghetti-texas-six
File name:39a32e3966c155109b9e617a60380c02.exe
Download: download sample
Signature LummaStealer
File size:2'852'124 bytes
First seen:2025-06-12 09:13:28 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 12e12319f1029ec4f8fcbed7e82df162 (430 x NirCmd, 392 x DCRat, 52 x RedLineStealer)
ssdeep 49152:7B6/ctCBgsmqUTpc8iYMl+gN8XWJW3ZcScy4wg4WksXOp39Xy9MZXA4wFSSeBXR6:FJsGl9TFMliGwiHHwYk4OpNi9MZA4wFV
Threatray 2'541 similar samples on MalwareBazaar
TLSH T1DAD52312FAC544B3D47129B2AA396710993CB9609F65DEDFE7D40D28EA709C0CB317E2
TrID 89.0% (.EXE) WinRAR Self Extracting archive (4.x-5.x) (265042/9/39)
3.5% (.EXE) Win64 Executable (generic) (10522/11/4)
2.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
1.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
1.5% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
dhash icon cdabae6fe6e7eaec (20 x Amadey, 9 x AurotunStealer, 8 x CoinMiner)
Reporter abuse_ch
Tags:exe LummaStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
436
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
39a32e3966c155109b9e617a60380c02.exe
Verdict:
Malicious activity
Analysis date:
2025-06-12 09:14:54 UTC
Tags:
amadey auto-sch botnet stealer loader rdp themida lumma auto-reg telegram evasion

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
vmdetect autorun autoit emotet
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Searching for the window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file
Creating a process from a recently created file
Running batch commands
Creating a process with a hidden window
Searching for analyzing tools
Launching a process
Creating a file in the %temp% subdirectories
Connection attempt to an infection source
Enabling autorun by creating a file
Sending an HTTP POST request to an infection source
Result
Threat name:
ScreenConnect Tool, Amadey, LummaC Steal
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Allocates memory in foreign processes
Antivirus detection for dropped file
Benign windows process drops PE files
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Check if machine is in data center or colocation facility
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Connects to many ports of the same IP (likely port scanning)
Contains functionality to hide user accounts
Contains functionality to start a terminal service
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Drops password protected ZIP file
Enables network access during safeboot for specific services
Found API chain indicative of sandbox detection
Found malware configuration
Hides threads from debuggers
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies security policies related information
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Possible COM Object hijacking
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Reads the Security eventlog
Reads the System eventlog
Sample uses string decryption to hide its real strings
Sets debug register (to hijack the execution of another thread)
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Rare Remote Thread Creation By Uncommon Source Image
Suricata IDS alerts for network traffic
Switches to a custom stack to bypass stack traces
System process connects to network (likely due to code injection or exploit)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses ipconfig to lookup or modify the Windows network settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadey
Yara detected Amadeys Clipper DLL
Yara detected Costura Assembly Loader
Yara detected LummaC Stealer
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1713025 Sample: bkdplk09n1.exe Startdate: 12/06/2025 Architecture: WINDOWS Score: 100 160 plapwf.top 2->160 162 otelrules.svc.static.microsoft 2->162 164 17 other IPs or domains 2->164 208 Suricata IDS alerts for network traffic 2->208 210 Found malware configuration 2->210 212 Malicious sample detected (through community Yara rule) 2->212 214 22 other signatures 2->214 13 bkdplk09n1.exe 8 2->13         started        16 msiexec.exe 2->16         started        19 9Nfc7nLU.exe 2->19         started        21 7 other processes 2->21 signatures3 process4 dnsIp5 132 C:\Users\user\profile\ibnUtqpj.exe, PE32 13->132 dropped 134 C:\Users\user\profile\9Nfc7nLU.exe, PE32 13->134 dropped 24 9Nfc7nLU.exe 13->24         started        136 C:\Windows\Installer\MSI662A.tmp, PE32 16->136 dropped 138 C:\Windows\Installer\MSI6435.tmp, PE32 16->138 dropped 140 C:\Windows\Installer\MSI5BF5.tmp, PE32 16->140 dropped 142 10 other malicious files 16->142 dropped 186 Enables network access during safeboot for specific services 16->186 188 Modifies security policies related information 16->188 27 msiexec.exe 16->27         started        29 msiexec.exe 16->29         started        190 Binary is likely a compiled AutoIt script file 19->190 31 rge1Ekii.exe 19->31         started        33 cmd.exe 1 19->33         started        35 cmd.exe 19->35         started        168 bacre.costariga.de 66.63.187.87 ASN-QUADRANET-GLOBALUS United States 21->168 192 Contains functionality to start a terminal service 21->192 194 Hides threads from debuggers 21->194 196 Reads the Security eventlog 21->196 198 3 other signatures 21->198 37 ScreenConnect.WindowsClient.exe 21->37         started        39 ScreenConnect.WindowsClient.exe 21->39         started        41 WerFault.exe 21->41         started        file6 signatures7 process8 signatures9 236 Multi AV Scanner detection for dropped file 24->236 238 Binary is likely a compiled AutoIt script file 24->238 240 Found API chain indicative of sandbox detection 24->240 43 rge1Ekii.exe 4 24->43         started        47 cmd.exe 1 24->47         started        49 cmd.exe 1 24->49         started        51 rundll32.exe 27->51         started        242 Contains functionality to start a terminal service 31->242 244 Hides threads from debuggers 31->244 246 Tries to detect sandboxes / dynamic malware analysis system (registry check) 31->246 248 Tries to detect process monitoring tools (Task Manager, Process Explorer etc.) 31->248 53 ibnUtqpj.exe 2 33->53         started        55 conhost.exe 33->55         started        57 conhost.exe 35->57         started        59 schtasks.exe 35->59         started        250 Contains functionality to hide user accounts 37->250 process10 file11 122 C:\Users\user\AppData\Local\...\ramez.exe, PE32 43->122 dropped 266 Multi AV Scanner detection for dropped file 43->266 268 Detected unpacking (changes PE section rights) 43->268 270 Contains functionality to start a terminal service 43->270 276 5 other signatures 43->276 61 ramez.exe 5 58 43->61         started        272 Uses schtasks.exe or at.exe to add and modify task schedules 47->272 66 ibnUtqpj.exe 2 47->66         started        68 conhost.exe 47->68         started        70 conhost.exe 49->70         started        72 schtasks.exe 1 49->72         started        124 C:\Windows\...\ScreenConnect.Windows.dll, PE32 51->124 dropped 126 C:\...\ScreenConnect.InstallerActions.dll, PE32 51->126 dropped 128 C:\Windows\...\ScreenConnect.Core.dll, PE32 51->128 dropped 130 4 other malicious files 51->130 dropped 274 Contains functionality to hide user accounts 51->274 signatures12 process13 dnsIp14 180 185.156.72.96, 49691, 49692, 80 ITDELUXE-ASRU Russian Federation 61->180 182 api.metaskins.gg 5.252.32.131 SAFEVALUE-ASDE Germany 61->182 184 2 other IPs or domains 61->184 144 zexNN81PkGFLTITkFx...SqJorPvPXK90iwO.exe, PE32+ 61->144 dropped 146 C:\Users\user\AppData\...\51053b5b04.exe, PE32 61->146 dropped 148 zexNN81PkGFLTITkFx...SqJorPvPXK90iwO.exe, PE32+ 61->148 dropped 152 24 other malicious files 61->152 dropped 278 Multi AV Scanner detection for dropped file 61->278 280 Detected unpacking (changes PE section rights) 61->280 282 Contains functionality to start a terminal service 61->282 284 5 other signatures 61->284 74 EMANhwD.exe 61->74         started        77 x2f9BGg.exe 61->77         started        79 MDXeY9z.exe 61->79         started        81 4 other processes 61->81 150 C:\Users\user\profile\rge1Ekii.exe, PE32 66->150 dropped file15 signatures16 process17 dnsIp18 252 Multi AV Scanner detection for dropped file 74->252 254 Writes to foreign memory regions 74->254 256 Allocates memory in foreign processes 74->256 84 MSBuild.exe 74->84         started        88 conhost.exe 74->88         started        258 Injects a PE file into a foreign processes 77->258 90 MSBuild.exe 77->90         started        92 conhost.exe 77->92         started        94 MSBuild.exe 77->94         started        260 Sets debug register (to hijack the execution of another thread) 79->260 262 Modifies the context of a thread in another process (thread injection) 79->262 96 MSBuild.exe 79->96         started        98 conhost.exe 79->98         started        156 ip-api.com 208.95.112.1 TUT-ASUS United States 81->156 158 193.233.237.189 FREE-NET-ASFREEnetEU Russian Federation 81->158 264 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 81->264 100 cmd.exe 81->100         started        102 WerFault.exe 81->102         started        signatures19 process20 dnsIp21 166 144.172.87.101 PONYNETUS United States 84->166 216 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 84->216 218 Tries to steal Mail credentials (via file / registry access) 84->218 220 Tries to harvest and steal browser information (history, passwords, etc) 84->220 234 5 other signatures 84->234 104 chrome.exe 84->104         started        107 chrome.exe 84->107 injected 109 chrome.exe 84->109 injected 222 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 90->222 224 Maps a DLL or memory area into another process 90->224 226 Checks if the current machine is a virtual machine (disk enumeration) 90->226 111 explorer.exe 90->111 injected 228 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 96->228 230 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 100->230 232 Uses ipconfig to lookup or modify the Windows network settings 100->232 115 conhost.exe 100->115         started        117 ipconfig.exe 100->117         started        signatures22 process23 dnsIp24 176 192.168.2.12, 443, 49685, 49691 unknown unknown 104->176 119 chrome.exe 104->119         started        178 helpsscodds.in 187.199.98.8 UninetSAdeCVMX Mexico 111->178 154 C:\Users\user\AppData\Roaming\auvutfg, PE32 111->154 dropped 200 System process connects to network (likely due to code injection or exploit) 111->200 202 Benign windows process drops PE files 111->202 204 Injects code into the Windows Explorer (explorer.exe) 111->204 206 Writes to foreign memory regions 111->206 file25 signatures26 process27 dnsIp28 170 clients2.googleusercontent.com 119->170 172 apis.google.com 119->172 174 5 other IPs or domains 119->174
Threat name:
Win32.Infostealer.Tinba
Status:
Malicious
First seen:
2025-06-11 23:09:30 UTC
AV detection:
11 of 38 (28.95%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:44caliber family:amadey family:lumma botnet:8d33eb collection defense_evasion discovery execution persistence privilege_escalation spyware stealer themida trojan
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Enumerates system info in registry
Gathers network information
Modifies data under HKEY_USERS
Modifies registry class
Runs net.exe
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Browser Information Discovery
Enumerates physical storage devices
Program crash
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Drops file in Windows directory
AutoIT Executable
Boot or Logon Autostart Execution: Authentication Package
Drops file in System32 directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Enumerates connected drives
Looks up external IP address via web service
Checks BIOS information in registry
Checks computer location settings
Event Triggered Execution: Component Object Model Hijacking
Executes dropped EXE
Identifies Wine through registry keys
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Themida packer
Command and Scripting Interpreter: PowerShell
Downloads MZ/PE file
Sets service image path in registry
Identifies VirtualBox via ACPI registry values (likely anti-VM)
44Caliber
44Caliber family
Amadey
Amadey family
Lumma Stealer, LummaC
Lumma family
Suspicious use of NtCreateUserProcessOtherParentProcess
Malware Config
C2 Extraction:
http://185.156.72.96
https://battlefled.top/gaoi
https://narrathfpt.top/tekq
https://escczlv.top/bufi
https://localixbiw.top/zlpa
https://korxddl.top/qidz
https://stochalyqp.xyz/alfp
https://diecam.top/laur/api
https://citellcagt.top/gjtu
https://peppinqikp.xyz/xaow
https://discord.com/api/webhooks/1382154535216091187/4eRZRfENg0xUxN0u45lFAYinAuPY5uR54LYmdp-DjP9Xe5otq3jQ7JGF6U33bAFgHtkK
Unpacked files
SH256 hash:
9e54445c35f5c02a9a97f95a4207457e36a94fc9e884b810d990f7d4b23bd6fd
MD5 hash:
39a32e3966c155109b9e617a60380c02
SHA1 hash:
9adf1f481f63d66522dbcb9af6a71010b360b577
SH256 hash:
b2ad8b5523276c49bee09981d1822195a231e0a6be23deca105af2ed3155de34
MD5 hash:
b4b079a81eefdf494f62d7f67c3ca42e
SHA1 hash:
fb3123306edaacc3df013ab0fb8d788acaa668d0
Detections:
AutoIT_Compiled
SH256 hash:
53a8366f7c25cd51fcaef4b24de3b979b1c33ac37a2eb8fe6137bc9bc81c01bc
MD5 hash:
d2f2341b51837bf464dce2613b8488da
SHA1 hash:
1b53ce4266d486edb2c2d11688e95c5a5f6b56c2
Detections:
Amadey
SH256 hash:
bd1f4c1b3d7bb873accf04236da2848fb093c3457a3d1d4eb05986aeeebc420a
MD5 hash:
d23dbe0f8cbafb87033b9a7f01472ce3
SHA1 hash:
1c621b91969feead4e4531a93167d9d559030998
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:dcrat_
Author:Michelle Khalil
Description:This rule detects unpacked dcrat malware samples.
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:icarus
Author:Michelle Khalil
Description:This rule detects unpacked icarus malware samples.
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:pe_detect_tls_callbacks
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SelfExtractingRAR
Author:Xavier Mertens
Description:Detects an SFX archive with automatic script execution
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
Reviews
IDCapabilitiesEvidence
GDI_PLUS_APIInterfaces with Graphicsgdiplus.dll::GdiplusStartup
gdiplus.dll::GdiplusShutdown
gdiplus.dll::GdipAlloc
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CloseHandle
KERNEL32.dll::CreateThread
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryW
KERNEL32.dll::LoadLibraryExA
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::GetSystemInfo
KERNEL32.dll::GetStartupInfoW
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::AllocConsole
KERNEL32.dll::AttachConsole
KERNEL32.dll::WriteConsoleW
KERNEL32.dll::FreeConsole
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleMode
KERNEL32.dll::GetConsoleCP
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateDirectoryW
KERNEL32.dll::CreateHardLinkW
KERNEL32.dll::CreateFileW
KERNEL32.dll::CreateFileMappingW
KERNEL32.dll::DeleteFileW
KERNEL32.dll::MoveFileW
KERNEL32.dll::MoveFileExW

Comments