MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c840481bc1a832a04da5a0556c3f7fc3cf4a81e2470179c3db0e987b473169e9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LummaStealer


Vendor detections: 15


Intelligence 15 IOCs YARA 4 File information Comments

SHA256 hash: c840481bc1a832a04da5a0556c3f7fc3cf4a81e2470179c3db0e987b473169e9
SHA3-384 hash: 478eaf43bf95281486cd3ed1d24319b998cd641cc6a4b7e6120547ac1dcf01159586a3b05b8d9f4d9437f42512dac56d
SHA1 hash: e09089533a46634c63743a1985874e5835434eff
MD5 hash: e0a0795db6976ce0414e3141250d9a77
humanhash: cardinal-west-bravo-saturn
File name:2.exe
Download: download sample
Signature LummaStealer
File size:3'179'008 bytes
First seen:2025-09-04 14:31:10 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 83ff2a6950f98d2f65fd6b1c5c33e68a (5 x LummaStealer, 2 x Stealc)
ssdeep 49152:9Ef96EtAFz464jYYSqNUPT957X6EMbXwG:GF6EtgLXrpVX2jt
TLSH T1F0E5BE19FC36D086ECE38071BF39D212D5222E77DF2C266B91DC49900165DEEA62E17B
TrID 63.5% (.EXE) Win64 Executable (generic) (10522/11/4)
12.2% (.EXE) OS/2 Executable (generic) (2029/13)
12.0% (.EXE) Generic Win/DOS Executable (2002/3)
12.0% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
Reporter abuse_ch
Tags:exe LummaStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
88
Origin country :
SE SE
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
2.exe
Verdict:
Malicious activity
Analysis date:
2025-09-04 14:39:15 UTC
Tags:
telegram lumma stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
81.4%
Tags:
virus
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
DNS request
Connection attempt
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Сreating synchronization primitives
Unauthorized injection to a system process
Verdict:
Malicious
File Type:
exe x64
First seen:
2025-09-03T23:30:00Z UTC
Last seen:
2025-09-03T23:30:00Z UTC
Hits:
~100
Detections:
Trojan-PSW.Win32.Lumma.vou Trojan-PSW.Vidar.HTTP.C&C PDM:Trojan.Win32.Generic
Result
Threat name:
Diamotrix Clipper, LummaC Stealer
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Changes memory attributes in foreign processes to executable or writable
Contains functionality to inject threads in other processes
Creates a thread in another existing process (thread injection)
Found malware configuration
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sets debug register (to hijack the execution of another thread)
Sigma detected: Silenttrinity Stager Msbuild Activity
Suricata IDS alerts for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal from password manager
Writes to foreign memory regions
Yara detected Diamotrix Clipper
Yara detected LummaC Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1771227 Sample: 2.exe Startdate: 04/09/2025 Architecture: WINDOWS Score: 100 72 starexs.bet 2->72 74 t.me 2->74 108 Suricata IDS alerts for network traffic 2->108 110 Found malware configuration 2->110 112 Malicious sample detected (through community Yara rule) 2->112 114 7 other signatures 2->114 12 2.exe 2->12         started        signatures3 process4 signatures5 140 Writes to foreign memory regions 12->140 142 Allocates memory in foreign processes 12->142 144 Injects a PE file into a foreign processes 12->144 15 MSBuild.exe 3 12->15         started        process6 dnsIp7 82 starexs.bet 193.24.123.239, 443, 49691, 49712 UPM-KYMMENE-ASKuusankoskiFinlandFI Germany 15->82 84 77.90.153.62, 49719, 80 RAPIDNET-DEHaunstetterStr19DE Germany 15->84 86 2 other IPs or domains 15->86 56 C:\Users\...\HQC6NK30Q8H44JMCNJ5A3WKFA.exe, PE32+ 15->56 dropped 58 C:\Users\...behaviorgraphT41UH9N43Y6NI4TJY5RTJ79Z.exe, PE32+ 15->58 dropped 60 C:\...\0QL8HBYU2XSIM4MTU8307IUYY45RH1.exe, PE32+ 15->60 dropped 88 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 15->88 90 Query firmware table information (likely to detect VMs) 15->90 92 Tries to harvest and steal ftp login credentials 15->92 94 3 other signatures 15->94 20 HQC6NK30Q8H44JMCNJ5A3WKFA.exe 52 15->20         started        24 0QL8HBYU2XSIM4MTU8307IUYY45RH1.exe 15->24         started        26 GT41UH9N43Y6NI4TJY5RTJ79Z.exe 15->26         started        28 4 other processes 15->28 file8 signatures9 process10 dnsIp11 64 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 20->64 dropped 66 C:\Users\user\AppData\Local\...\ucrtbase.dll, PE32+ 20->66 dropped 68 C:\Users\user\AppData\Local\...\select.pyd, PE32+ 20->68 dropped 70 47 other malicious files 20->70 dropped 128 Antivirus detection for dropped file 20->128 130 Multi AV Scanner detection for dropped file 20->130 31 HQC6NK30Q8H44JMCNJ5A3WKFA.exe 20->31         started        132 Contains functionality to inject threads in other processes 24->132 134 Sets debug register (to hijack the execution of another thread) 24->134 136 Modifies the context of a thread in another process (thread injection) 24->136 33 0QL8HBYU2XSIM4MTU8307IUYY45RH1.exe 1 2 24->33         started        138 Injects a PE file into a foreign processes 26->138 37 GT41UH9N43Y6NI4TJY5RTJ79Z.exe 2 26->37         started        80 192.168.2.6, 138, 443, 49689 unknown unknown 28->80 39 chrome.exe 28->39         started        42 chrome.exe 28->42         started        file12 signatures13 process14 dnsIp15 62 C:\Users\user\AppData\Roaming\...\System.exe, PE32+ 33->62 dropped 96 Changes memory attributes in foreign processes to executable or writable 33->96 98 Injects code into the Windows Explorer (explorer.exe) 33->98 100 Writes to foreign memory regions 33->100 44 explorer.exe 21 2 33->44 injected 102 Allocates memory in foreign processes 37->102 104 Creates a thread in another existing process (thread injection) 37->104 106 Injects a PE file into a foreign processes 37->106 76 www.google.com 142.250.81.228, 443, 49696, 49699 GOOGLEUS United States 39->76 78 142.251.41.4, 443, 49706, 49709 GOOGLEUS United States 42->78 file16 signatures17 process18 process19 46 System.exe 44->46         started        49 System.exe 44->49         started        signatures20 146 Multi AV Scanner detection for dropped file 46->146 148 Modifies the context of a thread in another process (thread injection) 46->148 150 Injects a PE file into a foreign processes 46->150 51 System.exe 46->51         started        54 System.exe 49->54         started        process21 signatures22 116 Changes memory attributes in foreign processes to executable or writable 51->116 118 Injects code into the Windows Explorer (explorer.exe) 51->118 120 Writes to foreign memory regions 51->120 122 Allocates memory in foreign processes 54->122 124 Creates a thread in another existing process (thread injection) 54->124 126 Injects a PE file into a foreign processes 54->126
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PE (Portable Executable) PE File Layout Win 64 Exe x64
Threat name:
Win64.Spyware.Lummastealer
Status:
Malicious
First seen:
2025-09-04 05:33:29 UTC
File Type:
PE+ (Exe)
AV detection:
28 of 38 (73.68%)
Threat level:
  2/5
Result
Malware family:
Score:
  10/10
Tags:
family:lumma discovery stealer
Behaviour
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Lumma Stealer, LummaC
Lumma family
Malware Config
C2 Extraction:
https://t.me/quincyplayer6
https://starexs.bet/tskx
https://mastwin.in/qsaz
https://noggs.ru/yopd
https://georgej.ru/plnb
https://oneflof.ru/tids
https://epitherd.ru/zadw
https://backab.ru/lkdo
https://eigwos.ru/wqex
https://kimmenkiz.ru/zldw
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
c840481bc1a832a04da5a0556c3f7fc3cf4a81e2470179c3db0e987b473169e9
MD5 hash:
e0a0795db6976ce0414e3141250d9a77
SHA1 hash:
e09089533a46634c63743a1985874e5835434eff
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:pe_detect_tls_callbacks
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

LummaStealer

Executable exe c840481bc1a832a04da5a0556c3f7fc3cf4a81e2470179c3db0e987b473169e9

(this sample)

  
Delivery method
Distributed via web download

Comments