MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b77917f8168aac6ee7fad0086fec05bb9718d6fc662326ff61540d06da29cda3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LummaStealer


Vendor detections: 14


Intelligence 14 IOCs YARA 2 File information Comments

SHA256 hash: b77917f8168aac6ee7fad0086fec05bb9718d6fc662326ff61540d06da29cda3
SHA3-384 hash: eb03e05d9e17f8939733fd65a6b6d47601f061d6940cbc46cf7801dd02ef415202f68ad271b089813ae3d628d16983c3
SHA1 hash: d6761bff6081d04cf8e18c24c4d97536e1f2e11e
MD5 hash: 04b22b5d7000c833153a713ac6108cb2
humanhash: magazine-wisconsin-echo-oklahoma
File name:random.exe
Download: download sample
Signature LummaStealer
File size:1'858'048 bytes
First seen:2025-04-17 06:18:18 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 2eabe9054cad5152567f0699947a2c5b (2'852 x LummaStealer, 1'312 x Stealc, 1'026 x Healer)
ssdeep 49152:tgeu6TXPy3jUj+/pKnW1YLwFoFbYvKZC3ls+F:ts6DawyL1rI813+s
TLSH T1EB8533280C06F611CB1E027F726A4071DBBB52E7B1D1ADF821078E5754A792EB35DE8B
TrID 42.7% (.EXE) Win32 Executable (generic) (4504/4/1)
19.2% (.EXE) OS/2 Executable (generic) (2029/13)
19.0% (.EXE) Generic Win/DOS Executable (2002/3)
18.9% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
Reporter abuse_ch
Tags:exe LummaStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
427
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
random.exe
Verdict:
Malicious activity
Analysis date:
2025-04-17 08:50:08 UTC
Tags:
lumma stealer loader amadey botnet telegram rdp hijackloader auto-reg purecrypter miner

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
vmdetect autorun emotet spam
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Searching for analyzing tools
Searching for the window
Connection attempt to an infection source
Using the Windows Management Instrumentation requests
Query of malicious DNS domain
Sending a TCP request to an infection source
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
anti-vm crypt packed packed packer_detected xpack
Result
Threat name:
LimeRAT, Amadey, LummaC Stealer, Private
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
Contains functionality to inject code into remote processes
Contains functionality to start a terminal service
Detected unpacking (changes PE section rights)
Found hidden mapped module (file has been removed from disk)
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Protects its processes via BreakOnTermination flag
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: LimeRAT
Sigma detected: Potentially Suspicious Malware Callback Communication
Sigma detected: Silenttrinity Stager Msbuild Activity
Suricata IDS alerts for network traffic
Switches to a custom stack to bypass stack traces
System process connects to network (likely due to code injection or exploit)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadey
Yara detected Amadeys Clipper DLL
Yara detected AntiVM3
Yara detected LimeRAT
Yara detected LummaC Stealer
Yara detected PrivateLoader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1667177 Sample: random.exe Startdate: 17/04/2025 Architecture: WINDOWS Score: 100 91 pastebin.com 2->91 93 zestmodp.top 2->93 95 6 other IPs or domains 2->95 139 Suricata IDS alerts for network traffic 2->139 141 Found malware configuration 2->141 143 Malicious sample detected (through community Yara rule) 2->143 147 20 other signatures 2->147 11 namez.exe 28 2->11         started        16 random.exe 1 2->16         started        18 Windows.exe 2->18         started        signatures3 145 Connects to a pastebin service (likely for C&C) 91->145 process4 dnsIp5 105 185.215.113.59, 49701, 49702, 49703 WHOLESALECONNECTIONSNL Portugal 11->105 81 C:\Users\user\AppData\Local\...\zdZK6Nx.exe, PE32 11->81 dropped 83 C:\Users\user\AppData\Local\...\LAc2heq.exe, PE32+ 11->83 dropped 85 C:\Users\user\AppData\Local\...\Hmcm0Oj.exe, PE32 11->85 dropped 89 7 other malicious files 11->89 dropped 181 Contains functionality to start a terminal service 11->181 183 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 11->183 20 zdZK6Nx.exe 11->20         started        24 70DYYFX.exe 4 11->24         started        26 LAc2heq.exe 11->26         started        30 2 other processes 11->30 107 185.39.17.162, 49695, 49770, 49774 RU-TAGNET-ASRU Russian Federation 16->107 109 changeaie.top 172.67.197.226, 443, 49694, 49798 CLOUDFLARENETUS United States 16->109 111 clarmodq.top 172.67.205.184, 443, 49685, 49688 CLOUDFLARENETUS United States 16->111 87 C:\Users\user\...\QFF0N6N2H85GARY1778XV.exe, PE32 16->87 dropped 185 Detected unpacking (changes PE section rights) 16->185 187 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 16->187 189 Query firmware table information (likely to detect VMs) 16->189 191 7 other signatures 16->191 28 QFF0N6N2H85GARY1778XV.exe 4 16->28         started        file6 signatures7 process8 file9 71 C:\Users\user\AppData\Local\...\vcl120.bpl, PE32 20->71 dropped 73 C:\Users\user\AppData\Local\...\rtl120.bpl, PE32 20->73 dropped 75 C:\Users\user\AppData\Local\...\ContSo.exe, PE32 20->75 dropped 149 Switches to a custom stack to bypass stack traces 20->149 32 ContSo.exe 20->32         started        77 C:\Users\user\AppData\Roaming\...\Windows.exe, PE32 24->77 dropped 151 Antivirus detection for dropped file 24->151 153 Multi AV Scanner detection for dropped file 24->153 155 Uses schtasks.exe or at.exe to add and modify task schedules 24->155 157 Hides that the sample has been downloaded from the Internet (zone.identifier) 24->157 36 Windows.exe 18 3 24->36         started        39 schtasks.exe 1 24->39         started        159 Writes to foreign memory regions 26->159 171 2 other signatures 26->171 41 MSBuild.exe 26->41         started        43 MSBuild.exe 26->43         started        79 C:\Users\user\AppData\Local\...\namez.exe, PE32 28->79 dropped 161 Contains functionality to start a terminal service 28->161 163 Contains functionality to inject code into remote processes 28->163 45 namez.exe 28->45         started        165 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 30->165 167 Query firmware table information (likely to detect VMs) 30->167 169 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 30->169 173 2 other signatures 30->173 47 MSBuild.exe 30->47         started        signatures10 process11 dnsIp12 63 C:\ProgramData\HttpNotepadMV_v5\vcl120.bpl, PE32 32->63 dropped 65 C:\ProgramData\HttpNotepadMV_v5\rtl120.bpl, PE32 32->65 dropped 67 C:\ProgramData\HttpNotepadMV_v5\ContSo.exe, PE32 32->67 dropped 113 Switches to a custom stack to bypass stack traces 32->113 49 ContSo.exe 32->49         started        97 172.252.236.112, 49776, 5552 EGIHOSTINGUS United States 36->97 99 pastebin.com 104.22.69.199, 443, 49775 CLOUDFLARENETUS United States 36->99 115 Antivirus detection for dropped file 36->115 117 Multi AV Scanner detection for dropped file 36->117 119 Protects its processes via BreakOnTermination flag 36->119 53 conhost.exe 39->53         started        121 Query firmware table information (likely to detect VMs) 41->121 123 Tries to harvest and steal ftp login credentials 41->123 125 Tries to harvest and steal browser information (history, passwords, etc) 41->125 127 Contains functionality to start a terminal service 45->127 101 zestmodp.top 104.21.64.1, 443, 49779, 49780 CLOUDFLARENETUS United States 47->101 129 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 47->129 131 Tries to steal Crypto Currency Wallets 47->131 file13 signatures14 process15 file16 69 C:\Users\user\AppData\Local\Temp\cad, PE32 49->69 dropped 133 Found hidden mapped module (file has been removed from disk) 49->133 135 Maps a DLL or memory area into another process 49->135 137 Switches to a custom stack to bypass stack traces 49->137 55 certutil.exe 49->55         started        59 cmd.exe 49->59         started        signatures17 process18 dnsIp19 103 185.183.32.103 WORLDSTREAMNL Netherlands 55->103 175 System process connects to network (likely due to code injection or exploit) 55->175 177 Query firmware table information (likely to detect VMs) 55->177 179 Switches to a custom stack to bypass stack traces 55->179 61 conhost.exe 59->61         started        signatures20 process21
Threat name:
Win32.Trojan.LummaStealer
Status:
Malicious
First seen:
2025-04-16 06:57:52 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
21 of 24 (87.50%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:lumma defense_evasion discovery spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Browser Information Discovery
System Location Discovery: System Language Discovery
Suspicious use of NtSetInformationThreadHideFromDebugger
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Reads user/profile data of web browsers
Checks BIOS information in registry
Identifies Wine through registry keys
Reads user/profile data of local email clients
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Lumma Stealer, LummaC
Lumma family
Malware Config
C2 Extraction:
https://8clarmodq.top/qoxo
https://gjawdedmirror.run/ewqd
https://changeaie.top/geps
https://lonfgshadow.live/xawi
https://iliftally.top/xasj
https://nighetwhisper.top/lekd
https://salaccgfa.top/gsooz
https://zestmodp.top/zeda
https://owlflright.digital/qopy
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
b77917f8168aac6ee7fad0086fec05bb9718d6fc662326ff61540d06da29cda3
MD5 hash:
04b22b5d7000c833153a713ac6108cb2
SHA1 hash:
d6761bff6081d04cf8e18c24c4d97536e1f2e11e
SH256 hash:
7fa6322f45286f96e377531d3f43e204e8cc6ad7802b1be56b7c73330e213686
MD5 hash:
c435f68dd4a465f988361ca61953d5fa
SHA1 hash:
321c8350a7940ffe6f83d01250a5b003612c4a75
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

LummaStealer

Executable exe b77917f8168aac6ee7fad0086fec05bb9718d6fc662326ff61540d06da29cda3

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
CHECK_NXMissing Non-Executable Memory Protectioncritical

Comments