MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a643d04ec41e433f50dc08ab4c9cb64d70dd01bf3e58f7544011b0b57282257f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LummaStealer


Vendor detections: 18


Intelligence 18 IOCs YARA 3 File information Comments

SHA256 hash: a643d04ec41e433f50dc08ab4c9cb64d70dd01bf3e58f7544011b0b57282257f
SHA3-384 hash: 9d54d610d3a44bef6635b86cab4eae37739bcbeeb018f4706fa304f58bc925f2652c42d2004386a1b099da1b8a35c1bf
SHA1 hash: b44906bcdec2c91fa27c63c33e77393836196e88
MD5 hash: 14e8cf3e0829472ad0abd08683688d74
humanhash: texas-alpha-summer-zebra
File name:a643d04ec41e433f50dc08ab4c9cb64d70dd01bf3e58f7544011b0b57282257f.exe
Download: download sample
Signature LummaStealer
File size:1'790'976 bytes
First seen:2025-09-01 09:06:08 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 2eabe9054cad5152567f0699947a2c5b (2'852 x LummaStealer, 1'312 x Stealc, 1'026 x Healer)
ssdeep 24576:W+Wo3j42uacakPBkUTAs9azb+CDsxM196buMzY5D/pLFGSKxjLvByxGNPfxO:7cDkQAsMzbsM1IbuwY5DhrovByIHxO
TLSH T1888533493D1F246CDAAC0B7D0825C77D3CE72A46B27B4C1C6C0DA57259EB2BAC78A05C
TrID 42.7% (.EXE) Win32 Executable (generic) (4504/4/1)
19.2% (.EXE) OS/2 Executable (generic) (2029/13)
19.0% (.EXE) Generic Win/DOS Executable (2002/3)
18.9% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
Reporter abuse_ch
Tags:exe LummaStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
74
Origin country :
SE SE
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
3ce25d4b2c991ec08adcfd0cea5733937de9e18dc347165d99f81bb25a9d1f77.exe
Verdict:
Malicious activity
Analysis date:
2025-08-31 21:35:05 UTC
Tags:
lumma stealer themida amadey botnet loader auto redline rdp telegram autoit stealc remote xworm ims-api generic purelogsstealer anti-evasion rhadamanthys qrcode auto-reg purehvnc netreactor

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
90.2%
Tags:
vmdetect phishing
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Searching for analyzing tools
DNS request
Connection attempt
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-vm crypt obfuscated packed packed packer_detected
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-08-31T19:32:00Z UTC
Last seen:
2025-08-31T19:32:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan.Win32.Generic PDM:Trojan.Win32.Generic Trojan-PSW.Win32.Lumma.sb HEUR:Trojan-PSW.Win32.Lumma.pef HEUR:Trojan-PSW.Win32.Lumma.gen
Result
Threat name:
ScreenConnect Tool, Amadey, LummaC Steal
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Contains functionality to hide user accounts
Contains functionality to inject code into remote processes
Contains functionality to start a terminal service
Creates a thread in another existing process (thread injection)
Enables network access during safeboot for specific services
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Modifies security policies related information
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Reads the Security eventlog
Reads the System eventlog
Sample uses string decryption to hide its real strings
Sigma detected: Rare Remote Thread Creation By Uncommon Source Image
Sigma detected: Remote Access Tool - ScreenConnect Suspicious Execution
Sigma detected: Silenttrinity Stager Msbuild Activity
Suricata IDS alerts for network traffic
Suspicious execution chain found
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal from password manager
Tries to steal Mail credentials (via file / registry access)
Uses attrib.exe to hide files
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected LummaC Stealer
Yara detected PureLog Stealer
Yara detected Stealc v2
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1768788 Sample: Hsu5Tn6Jg6.exe Startdate: 01/09/2025 Architecture: WINDOWS Score: 100 146 washerv.ru 2->146 148 t.me 2->148 150 9 other IPs or domains 2->150 206 Suricata IDS alerts for network traffic 2->206 208 Found malware configuration 2->208 210 Antivirus detection for dropped file 2->210 212 17 other signatures 2->212 11 Hsu5Tn6Jg6.exe 1 2->11         started        16 msiexec.exe 2->16         started        18 ScreenConnect.ClientService.exe 2->18         started        20 9 other processes 2->20 signatures3 process4 dnsIp5 184 178.16.55.189, 49752, 49755, 49758 DUSNET-ASDE Germany 11->184 186 earffgm.top 31.220.109.219, 443, 49687, 49744 AS-HOSTINGERLT Lithuania 11->186 128 C:\Users\user\...\PPW0BLMF4TI4Y96CXZGIK.exe, PE32 11->128 dropped 236 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 11->236 238 Query firmware table information (likely to detect VMs) 11->238 240 Tries to detect sandboxes and other dynamic analysis tools (window names) 11->240 252 8 other signatures 11->252 22 PPW0BLMF4TI4Y96CXZGIK.exe 6 43 11->22         started        27 chrome.exe 11->27         started        29 chrome.exe 11->29         started        39 2 other processes 11->39 130 C:\Windows\Installer\MSIA506.tmp, PE32 16->130 dropped 132 C:\Windows\Installer\MSIA2D2.tmp, PE32 16->132 dropped 134 C:\Windows\Installer\MSI9EE8.tmp, PE32 16->134 dropped 136 10 other malicious files 16->136 dropped 242 Enables network access during safeboot for specific services 16->242 244 Modifies security policies related information 16->244 31 msiexec.exe 16->31         started        33 msiexec.exe 16->33         started        188 relay.darkypanel.click 107.189.21.122 PONYNETUS United States 18->188 246 Reads the Security eventlog 18->246 248 Reads the System eventlog 18->248 35 ScreenConnect.WindowsClient.exe 18->35         started        37 ScreenConnect.WindowsClient.exe 18->37         started        250 Changes security center settings (notifications, updates, antivirus, firewall) 20->250 41 2 other processes 20->41 file6 signatures7 process8 dnsIp9 166 94.154.35.25, 49753, 49754, 49756 SELECTELRU Ukraine 22->166 112 C:\Users\user\AppData\Local\...\sQNHMrP.exe, PE32+ 22->112 dropped 114 C:\Users\user\AppData\Local\...\FaPJWth.exe, PE32+ 22->114 dropped 116 C:\Users\user\AppData\Local\...\Tse2E3k.exe, PE32+ 22->116 dropped 118 14 other malicious files 22->118 dropped 214 Multi AV Scanner detection for dropped file 22->214 216 Contains functionality to start a terminal service 22->216 218 Contains functionality to inject code into remote processes 22->218 43 G9Qkcq0.exe 22->43         started        46 fbfb0c1260.exe 22->46         started        48 YXJ9Hvg.exe 22->48         started        60 6 other processes 22->60 168 192.168.2.6, 443, 49687, 49690 unknown unknown 27->168 50 chrome.exe 27->50         started        53 chrome.exe 29->53         started        220 Suspicious execution chain found 31->220 55 rundll32.exe 31->55         started        222 Contains functionality to hide user accounts 35->222 62 2 other processes 39->62 58 conhost.exe 41->58         started        file10 signatures11 process12 dnsIp13 224 Multi AV Scanner detection for dropped file 43->224 226 Writes to foreign memory regions 43->226 228 Allocates memory in foreign processes 43->228 64 MSBuild.exe 43->64         started        230 Injects a PE file into a foreign processes 46->230 68 MSBuild.exe 46->68         started        70 MSBuild.exe 46->70         started        72 MSBuild.exe 46->72         started        74 MSBuild.exe 48->74         started        152 www.google.com 142.250.80.100, 443, 49690, 49693 GOOGLEUS United States 50->152 154 142.250.65.196, 443, 49711, 49712 GOOGLEUS United States 53->154 156 trainisshit.shop 53->156 120 C:\Windows\...\ScreenConnect.Windows.dll, PE32 55->120 dropped 122 C:\...\ScreenConnect.InstallerActions.dll, PE32 55->122 dropped 124 C:\Windows\...\ScreenConnect.Core.dll, PE32 55->124 dropped 126 4 other malicious files 55->126 dropped 232 Contains functionality to hide user accounts 55->232 158 mastwin.in 129.226.128.168 TENCENT-NET-AP-CNTencentBuildingKejizhongyiAvenueCN Singapore 60->158 160 185.102.115.104 MaxihostLTDABR Poland 60->160 234 Uses attrib.exe to hide files 60->234 76 xcopy.exe 60->76         started        79 MSBuild.exe 60->79         started        81 conhost.exe 60->81         started        83 4 other processes 60->83 162 142.251.40.100, 443, 49737, 49738 GOOGLEUS United States 62->162 file14 signatures15 process16 dnsIp17 140 107.189.21.235 PONYNETUS United States 64->140 190 Tries to steal Mail credentials (via file / registry access) 64->190 192 Writes to foreign memory regions 64->192 194 Allocates memory in foreign processes 64->194 204 3 other signatures 64->204 85 chrome.exe 64->85         started        88 chrome.exe 64->88 injected 90 chrome.exe 64->90 injected 92 chrome.exe 64->92 injected 142 t.me 149.154.167.99, 443, 49757 TELEGRAMRU United Kingdom 68->142 196 Found many strings related to Crypto-Wallets (likely being stolen) 68->196 198 Tries to harvest and steal browser information (history, passwords, etc) 68->198 200 Tries to steal Crypto Currency Wallets 68->200 94 chrome.exe 68->94         started        97 chrome.exe 68->97         started        99 chrome.exe 68->99         started        101 chrome.exe 68->101         started        202 Switches to a custom stack to bypass stack traces 70->202 103 WerFault.exe 74->103         started        138 C:\Users\user\AppData\...\tv9IK83.cmd.Jta, PE32 76->138 dropped 144 trainisshit.shop 87.120.126.216 UNACS-AS-BG8000BurgasBG Bulgaria 79->144 file18 signatures19 process20 dnsIp21 164 192.168.2.9 unknown unknown 85->164 105 chrome.exe 85->105         started        254 Found many strings related to Crypto-Wallets (likely being stolen) 94->254 108 chrome.exe 94->108         started        110 chrome.exe 97->110         started        signatures22 process23 dnsIp24 170 googlehosted.l.googleusercontent.com 142.250.65.225 GOOGLEUS United States 105->170 172 142.250.80.36 GOOGLEUS United States 105->172 182 2 other IPs or domains 105->182 174 142.251.32.100 GOOGLEUS United States 108->174 176 www.google.com 108->176 178 142.250.72.100 GOOGLEUS United States 110->178 180 www.google.com 110->180
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PE (Portable Executable) PE File Layout Win 32 Exe x86
Threat name:
Win32.Trojan.LummaStealer
Status:
Malicious
First seen:
2025-08-31 21:51:28 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
29 of 36 (80.56%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
lummastealer
Similar samples:
Result
Malware family:
Score:
  10/10
Tags:
family:lumma defense_evasion discovery spyware stealer
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Browser Information Discovery
Modifies trusted root certificate store through registry
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Checks BIOS information in registry
Identifies Wine through registry keys
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Lumma Stealer, LummaC
Lumma family
Malware Config
C2 Extraction:
https://washerv.ru/qygd
https://mastwin.in/qsaz
https://noggs.ru/yopd
https://georgej.ru/plnb
https://oneflof.ru/tids
https://epitherd.ru/zadw
https://backab.ru/lkdo
https://eigwos.ru/wqex
https://kimmenkiz.ru/zldw
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
a643d04ec41e433f50dc08ab4c9cb64d70dd01bf3e58f7544011b0b57282257f
MD5 hash:
14e8cf3e0829472ad0abd08683688d74
SHA1 hash:
b44906bcdec2c91fa27c63c33e77393836196e88
SH256 hash:
5384e50e600a00a851694eff92527cad2e63b280266fcf10cf8c890e5e19d742
MD5 hash:
d3e414a623722ec2129284cddf7825c2
SHA1 hash:
f0d9b63634c027d5e6af122cf11c8219bc390c95
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_AllMal_Detector
Author:DiegoAnalytics
Description:CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments