MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a81578dc4abcb969e52cf378881349487b046b70181ddde99e6b87e4646683ed. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LummaStealer


Vendor detections: 16


Intelligence 16 IOCs YARA 1 File information Comments

SHA256 hash: a81578dc4abcb969e52cf378881349487b046b70181ddde99e6b87e4646683ed
SHA3-384 hash: 459428d5436ca8ec852397ff0256014cfedb4400ccdadf21f4ff2c2be30b0451f16ba4869f4c32c0ff3007783a823323
SHA1 hash: 582fd69230e2c019dbbf75b2486c86a293920c08
MD5 hash: d11cf343c0de369b13e0d211b1b8515a
humanhash: enemy-table-golf-wyoming
File name:random.exe
Download: download sample
Signature LummaStealer
File size:1'904'640 bytes
First seen:2025-04-29 05:58:25 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 2eabe9054cad5152567f0699947a2c5b (2'852 x LummaStealer, 1'312 x Stealc, 1'026 x Healer)
ssdeep 49152:MQBoeieHeoqOtIaRjuH+EG99UKw1XAnVh1R5YrQW7MVlf7t:WSJtXYHqBYAnVh1RInAVBR
Threatray 1 similar samples on MalwareBazaar
TLSH T1859533D23421F96AC15D0273CC955BB93B36A78222996417F3D08426AD2F3B5BB53CBC
TrID 42.7% (.EXE) Win32 Executable (generic) (4504/4/1)
19.2% (.EXE) OS/2 Executable (generic) (2029/13)
19.0% (.EXE) Generic Win/DOS Executable (2002/3)
18.9% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
Reporter abuse_ch
Tags:exe LummaStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
436
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
random.exe
Verdict:
Malicious activity
Analysis date:
2025-04-29 06:42:00 UTC
Tags:
lumma stealer loader themida auto botnet amadey auto-reg credentialflusher auto-sch telegram putty rmm-tool phishing purecrypter purelogs exfiltration generic rdp gcleaner pastebin

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
96.5%
Tags:
phishing autorun emotet
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Searching for analyzing tools
DNS request
Connection attempt
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Query of malicious DNS domain
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
crypt entropy packed packed packer_detected rat virtual xpack
Result
Threat name:
Amadey, Credential Flusher, Healer AV Di
Detection:
malicious
Classification:
phis.troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
Contains functionality to inject code into remote processes
Contains functionality to start a terminal service
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Found malware configuration
Hides threads from debuggers
Joe Sandbox ML detected suspicious sample
Modifies windows update settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: New RUN Key Pointing to Suspicious Folder
Suricata IDS alerts for network traffic
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal from password manager
Yara detected Amadey
Yara detected Amadeys Clipper DLL
Yara detected Credential Flusher
Yara detected Healer AV Disabler
Yara detected LummaC Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1676975 Sample: random.exe Startdate: 29/04/2025 Architecture: WINDOWS Score: 100 95 pastebin.com 2->95 97 zenithcorde.top 2->97 99 45 other IPs or domains 2->99 115 Suricata IDS alerts for network traffic 2->115 117 Found malware configuration 2->117 119 Antivirus detection for URL or domain 2->119 123 14 other signatures 2->123 9 saved.exe 3 25 2->9         started        14 random.exe 1 2->14         started        16 f867607820.exe 2->16         started        18 5 other processes 2->18 signatures3 121 Connects to a pastebin service (likely for C&C) 95->121 process4 dnsIp5 101 185.39.17.163, 49697, 49698, 49699 RU-TAGNET-ASRU Russian Federation 9->101 103 push.services.mozilla.com 9->103 73 C:\Users\user\AppData\...\6aa1cdb04e.exe, PE32 9->73 dropped 75 C:\Users\user\AppData\...\da54f1f49a.exe, PE32 9->75 dropped 77 C:\Users\user\AppData\...\f867607820.exe, PE32 9->77 dropped 81 3 other malicious files 9->81 dropped 153 Contains functionality to start a terminal service 9->153 155 Creates multiple autostart registry keys 9->155 20 f867607820.exe 1 9->20         started        24 da54f1f49a.exe 9 1 9->24         started        26 6aa1cdb04e.exe 9->26         started        105 185.39.17.162, 49692, 49727, 49731 RU-TAGNET-ASRU Russian Federation 14->105 107 zenithcorde.top 172.67.190.162, 443, 49684, 49685 CLOUDFLARENETUS United States 14->107 79 C:\Users\user\...7ALCMJI522DTL5Y8.exe, PE32 14->79 dropped 157 Detected unpacking (changes PE section rights) 14->157 159 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 14->159 161 Query firmware table information (likely to detect VMs) 14->161 177 3 other signatures 14->177 28 E7ALCMJI522DTL5Y8.exe 4 14->28         started        163 Tries to harvest and steal ftp login credentials 16->163 165 Tries to harvest and steal browser information (history, passwords, etc) 16->165 167 Tries to steal Crypto Currency Wallets 16->167 169 Tries to steal from password manager 16->169 171 Binary is likely a compiled AutoIt script file 18->171 173 Hides threads from debuggers 18->173 175 Tries to detect sandboxes / dynamic malware analysis system (registry check) 18->175 30 chrome.exe 18->30         started        33 chrome.exe 18->33         started        35 firefox.exe 18->35         started        37 5 other processes 18->37 file6 signatures7 process8 dnsIp9 69 C:\Users\...\HE8LXWA8A5XMNF7XQ19WILDIBS.exe, PE32 20->69 dropped 125 Antivirus detection for dropped file 20->125 127 Detected unpacking (changes PE section rights) 20->127 129 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 20->129 145 7 other signatures 20->145 39 HE8LXWA8A5XMNF7XQ19WILDIBS.exe 20->39         started        131 Modifies windows update settings 24->131 133 Disables Windows Defender Tamper protection 24->133 135 Tries to evade debugger and weak emulator (self modifying code) 24->135 147 2 other signatures 24->147 137 Binary is likely a compiled AutoIt script file 26->137 42 taskkill.exe 26->42         started        44 taskkill.exe 26->44         started        55 4 other processes 26->55 71 C:\Users\user\AppData\Local\...\saved.exe, PE32 28->71 dropped 139 Multi AV Scanner detection for dropped file 28->139 141 Contains functionality to start a terminal service 28->141 143 Contains functionality to inject code into remote processes 28->143 46 saved.exe 28->46         started        109 192.168.2.9, 443, 49684, 49685 unknown unknown 30->109 48 chrome.exe 30->48         started        51 chrome.exe 33->51         started        111 prod.classify-client.prod.webservices.mozgcp.net 35.190.72.216, 443, 49793, 49824 GOOGLEUS United States 35->111 113 127.0.0.1 unknown unknown 35->113 53 firefox.exe 35->53         started        57 2 other processes 37->57 file10 signatures11 process12 dnsIp13 59 conhost.exe 42->59         started        61 conhost.exe 44->61         started        149 Multi AV Scanner detection for dropped file 46->149 151 Contains functionality to start a terminal service 46->151 83 www.google.com 142.250.217.132, 443, 49747, 49748 GOOGLEUS United States 48->83 85 plus.l.google.com 48->85 91 3 other IPs or domains 48->91 87 play.google.com 142.250.189.14, 443, 49792, 49796 GOOGLEUS United States 51->87 89 142.250.69.4, 443, 49772, 49773 GOOGLEUS United States 51->89 93 4 other IPs or domains 51->93 63 conhost.exe 55->63         started        65 conhost.exe 55->65         started        67 conhost.exe 55->67         started        signatures14 process15
Threat name:
Win32.Trojan.Egairtigado
Status:
Malicious
First seen:
2025-04-28 12:55:36 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
20 of 24 (83.33%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:lumma defense_evasion discovery spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Browser Information Discovery
System Location Discovery: System Language Discovery
Suspicious use of NtSetInformationThreadHideFromDebugger
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Checks BIOS information in registry
Identifies Wine through registry keys
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Lumma Stealer, LummaC
Lumma family
Malware Config
C2 Extraction:
https://clarmodq.top/qoxo
https://zenithcorde.top/auid
https://techguidet.digital/apdo
https://btcgeared.live/lbak
https://hbuzzarddf.live/ktnt
https://gtechsyncq.run/riid
https://parakehjet.run/kewk
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
a81578dc4abcb969e52cf378881349487b046b70181ddde99e6b87e4646683ed
MD5 hash:
d11cf343c0de369b13e0d211b1b8515a
SHA1 hash:
582fd69230e2c019dbbf75b2486c86a293920c08
SH256 hash:
effa8c5e9510bfcebf7275a507b745217c357a2879f1e18b24571041626adcc7
MD5 hash:
ee09e09a1b7fd1bd137210c5519e0134
SHA1 hash:
bd4e253d5cc2220dcf0d8b7c08040592f345d1e7
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

LummaStealer

Executable exe a81578dc4abcb969e52cf378881349487b046b70181ddde99e6b87e4646683ed

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
CHECK_NXMissing Non-Executable Memory Protectioncritical

Comments