MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e682c8222f3a68109482061e9591a307512e2cf9c1149ce771eb2f89898b3a6c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LummaStealer


Vendor detections: 18


Intelligence 18 IOCs YARA 6 File information Comments

SHA256 hash: e682c8222f3a68109482061e9591a307512e2cf9c1149ce771eb2f89898b3a6c
SHA3-384 hash: bf609a2232e55b4eb8d352f8459f95d1239d975dd8c1986f799214e0f5f075478f2191f698f1e454b76edd898695998d
SHA1 hash: 4c252add7ca1d05b4c204e5f43c5c1c52bbb9194
MD5 hash: 287364d198a535e3fd3643d55e38055c
humanhash: twenty-pennsylvania-alpha-item
File name:random.exe
Download: download sample
Signature LummaStealer
File size:5'637'632 bytes
First seen:2025-04-04 08:41:32 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader)
ssdeep 98304:MGK6dLZWrN5EXrwW+Hytgc7yGuSKvy659q2c0cJ6ChSoNRzqB0ARkP9Xk:lxZWrXEXr5+StgcGGuLvy6f00cRNwuAA
TLSH T15E463317EEE8AA28E8F453B08D3F11A31431F7B32D318397069EAD6D5C635B06E15A53
TrID 37.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
20.0% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
12.7% (.EXE) Win64 Executable (generic) (10522/11/4)
7.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
6.1% (.EXE) Win16 NE executable (generic) (5038/12/1)
Magika pebin
dhash icon f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader)
Reporter abuse_ch
Tags:exe LummaStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
14
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
random.exe
Verdict:
Malicious activity
Analysis date:
2025-04-04 08:52:20 UTC
Tags:
lumma stealer amadey botnet stealc loader auto themida rdp generic gcleaner

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
96.5%
Tags:
autorun dropper virus crypt
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Сreating synchronization primitives
Searching for analyzing tools
Searching for the window
Creating a file
Creating a window
Searching for synchronization primitives
Behavior that indicates a threat
DNS request
Connection attempt
Sending a custom TCP request
Connection attempt to an infection source
Query of malicious DNS domain
Enabling autorun by creating a file
Sending an HTTP POST request to an infection source
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
adaptive-context CAB crypt cryptbot explorer installer installer lolbin lolbin microsoft_visual_cc packed packed packer_detected rundll32 runonce sfx stealc
Malware family:
LummaC2 Stealer
Verdict:
Malicious
Result
Threat name:
Amadey, LummaC Stealer
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to start a terminal service
Detected unpacking (changes PE section rights)
Found malware configuration
Hides threads from debuggers
Joe Sandbox ML detected suspicious sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Potentially malicious time measurement code found
Sample uses string decryption to hide its real strings
Suricata IDS alerts for network traffic
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Yara detected Amadey
Yara detected Amadeys Clipper DLL
Yara detected LummaC Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1656504 Sample: random.exe Startdate: 04/04/2025 Architecture: WINDOWS Score: 100 44 uncertainyelemz.bet 2->44 46 subawhipnator.life 2->46 48 8 other IPs or domains 2->48 54 Suricata IDS alerts for network traffic 2->54 56 Found malware configuration 2->56 58 Antivirus detection for URL or domain 2->58 60 12 other signatures 2->60 9 random.exe 1 4 2->9         started        12 rapes.exe 2->12         started        15 rapes.exe 12 2->15         started        18 rundll32.exe 2->18         started        signatures3 process4 dnsIp5 40 C:\Users\user\AppData\Local\...\L6I13.exe, PE32 9->40 dropped 42 C:\Users\user\AppData\Local\...\3n03B.exe, PE32 9->42 dropped 20 L6I13.exe 1 4 9->20         started        80 Antivirus detection for dropped file 12->80 82 Multi AV Scanner detection for dropped file 12->82 84 Detected unpacking (changes PE section rights) 12->84 92 5 other signatures 12->92 52 176.113.115.6, 80 SELECTELRU Russian Federation 15->52 86 Contains functionality to start a terminal service 15->86 88 Hides threads from debuggers 15->88 90 Tries to detect sandboxes / dynamic malware analysis system (registry check) 15->90 file6 signatures7 process8 file9 34 C:\Users\user\AppData\Local\...\2p7021.exe, PE32 20->34 dropped 36 C:\Users\user\AppData\Local\...\1U31H7.exe, PE32 20->36 dropped 62 Antivirus detection for dropped file 20->62 64 Multi AV Scanner detection for dropped file 20->64 24 1U31H7.exe 4 20->24         started        28 2p7021.exe 20->28         started        signatures10 process11 dnsIp12 38 C:\Users\user\AppData\Local\...\rapes.exe, PE32 24->38 dropped 66 Antivirus detection for dropped file 24->66 68 Multi AV Scanner detection for dropped file 24->68 70 Detected unpacking (changes PE section rights) 24->70 78 4 other signatures 24->78 31 rapes.exe 24->31         started        50 steamcommunity.com 23.204.10.89, 443, 49692 AKAMAI-ASUS United States 28->50 72 Tries to evade debugger and weak emulator (self modifying code) 28->72 74 Hides threads from debuggers 28->74 76 Tries to detect sandboxes / dynamic malware analysis system (registry check) 28->76 file13 signatures14 process15 signatures16 94 Contains functionality to start a terminal service 31->94 96 Hides threads from debuggers 31->96 98 Tries to detect sandboxes / dynamic malware analysis system (registry check) 31->98 100 Tries to detect process monitoring tools (Task Manager, Process Explorer etc.) 31->100
Threat name:
Win32.Trojan.LummaStealer
Status:
Malicious
First seen:
2025-04-03 23:06:20 UTC
File Type:
PE (Exe)
Extracted files:
78
AV detection:
19 of 24 (79.17%)
Threat level:
  5/5
Result
Malware family:
stormkitty
Score:
  10/10
Tags:
family:amadey family:asyncrat family:gcleaner family:lumma family:stormkitty botnet:092155 defense_evasion discovery execution exploit loader persistence rat spyware stealer trojan
Behaviour
Delays execution with timeout.exe
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Enumerates physical storage devices
Program crash
System Location Discovery: System Language Discovery
Drops file in Windows directory
Launches sc.exe
AutoIT Executable
Enumerates processes with tasklist
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Adds Run key to start application
Checks installed software on the system
Checks BIOS information in registry
Checks computer location settings
Executes dropped EXE
Identifies Wine through registry keys
Loads dropped DLL
Modifies file permissions
Reads user/profile data of local email clients
Blocklisted process makes network request
Command and Scripting Interpreter: PowerShell
Creates new service(s)
Downloads MZ/PE file
Possible privilege escalation attempt
Stops running service(s)
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Amadey
Amadey family
AsyncRat
Asyncrat family
GCleaner
Gcleaner family
Lumma Stealer, LummaC
Lumma family
Modifies security service
StormKitty
StormKitty payload
Stormkitty family
Malware Config
C2 Extraction:
http://176.113.115.6
https://pirtyoffensiz.bet/api
https://luncertainyelemz.bet/api
https://hobbyedsmoker.live/api
https://dsfljsdfjewf.info/api
https://gdeaddereaste.today/api
https://subawhipnator.life/api
https://fprivileggoe.live/api
https://decreaserid.world/api
https://pastedeputten.life/api
https://synmedsp.live/lzkdj
https://metalsyo.digital/opsa
https://ironloxp.live/aksdd
https://navstarx.shop/FoaJSi
https://starcloc.bet/GOksAo
https://advennture.top/GKsiio
https://targett.top/dsANGt
https://sspacedbv.world/EKdlsk
https://galxnetb.today/GsuIAo
https://0scenarisacri.top/gHSAYuqo
https://njrxsafer.top/shpaoz
https://zkrxspint.digital/kendwz
https://rhxhube.run/pogrs
https://grxeasyw.digital/xxepw
https://xrfxcaseq.live/gspaz
https://mywmedici.top/noagis
https://jrxsafer.top/shpaoz
https://gkrxspint.digital/kendwz
https://erhxhube.run/pogrs
https://ywmedici.top/noagis
https://28jrxsafer.top/shpaoz
https://krxspint.digital/kendwz
https://kadvennture.top/GKsiio
https://rodformi.run/aUosoz
https://wstarcloc.bet/GOksAo
https://atargett.top/dsANGt
https://spacedbv.world/EKdlsk
185.156.73.98
45.91.200.135
Dropper Extraction:
http://176.113.115.7/mine/random.exe
Verdict:
Malicious
Tags:
stealer redline Win.Packed.Disabler-10010786-0
YARA:
detect_Redline_Stealer
Unpacked files
SH256 hash:
e682c8222f3a68109482061e9591a307512e2cf9c1149ce771eb2f89898b3a6c
MD5 hash:
287364d198a535e3fd3643d55e38055c
SHA1 hash:
4c252add7ca1d05b4c204e5f43c5c1c52bbb9194
SH256 hash:
878b8af02d6779a82556d9e054ec68042949dbebf22d89dff23242b77a974090
MD5 hash:
7779013d46adeb2441bc1ba2301264b5
SHA1 hash:
a30b1877c67977b5b2010559ca91e4580a3bcfe2
SH256 hash:
f301a037ca73d4cce8278112f6b16a6d2e9ec901e887b6456002b55f49112447
MD5 hash:
f42d0530dd8a92a2197a76e7f7a6f482
SHA1 hash:
dc2b57314642752b37567ae24a8b284685898003
Detections:
win_redline_wextract_hunting_oct_2023
SH256 hash:
a0dcefd03eefbbb05488cf098ec0ff6312e468a21c49a787e7a46ddc04583c24
MD5 hash:
1517359f419ce7c870c54ce65ae99d45
SHA1 hash:
47c88c8cde3bd577b9a99c82461e2fc2a9607349
Detections:
Amadey
SH256 hash:
7bc46190f90fec8777fc70e948037c0015eab848e34db0e35d29a4fc120105f0
MD5 hash:
da566ea5bcac2c043f237741bbc0e51d
SHA1 hash:
d8f510ba5b3207720c820455d28f78c2d200bddc
Detections:
Amadey
SH256 hash:
d4c718340b731341e9c1193c13d3ce2f20162dd71379e6abc4170c11e39f5293
MD5 hash:
0aa806d7a4cc772368b0278e96a562ff
SHA1 hash:
b88d96db2b492e44156d390406146b6b78c41381
SH256 hash:
191d339acd3d6c4322593b5d3a7f52a8d30861964e7c411f217e96b99d0f198f
MD5 hash:
b78dff491fea7ce6578fbd4c88fca3f8
SHA1 hash:
a0892dd19455d94924bd03ef265308863eba6732
Detections:
stealc
SH256 hash:
81ac77037e15e56a6cdc0ba7e2af38e3e5a9f7a353054276c763e57d03db5ec1
MD5 hash:
1e95dc10fef7079a5d3fa793732a7cce
SHA1 hash:
8e9ccb511e76c921c6ddf2a2615a2e3c86ea4113
SH256 hash:
878228e580cd27a72a847922f9b16b7d16d0797c68aa9e6642ae3da13518de7a
MD5 hash:
93da4bdbae52d91d32a34c140466e8cf
SHA1 hash:
2177f234160ef77058d2237a8f97c1d663647240
SH256 hash:
8d7d52c04fbd9fb28348d8b0346b1331ae5f93f1c3063a67c89a5c4ee1330eba
MD5 hash:
f57495f53acd120aecedd85d16ba34ab
SHA1 hash:
64b0576fa1e754318fa8ee9c3bd04307af707bda
Detections:
win_redline_wextract_hunting_oct_2023
SH256 hash:
aa38c813aafc36532f6d8e826f2f7665b26c2c0ef2ff7395c21230f2640cb966
MD5 hash:
5e79df97975b488e901487db545d5de8
SHA1 hash:
2cc617e5bd4cf348b8a1fccf2716686cf2c63fe6
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:detect_Redline_Stealer
Author:Varp0s
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:pe_detect_tls_callbacks
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

LummaStealer

Executable exe e682c8222f3a68109482061e9591a307512e2cf9c1149ce771eb2f89898b3a6c

(this sample)

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
Reviews
IDCapabilitiesEvidence
AUTH_APIManipulates User AuthorizationADVAPI32.dll::AllocateAndInitializeSid
ADVAPI32.dll::EqualSid
ADVAPI32.dll::FreeSid
SECURITY_BASE_APIUses Security Base APIADVAPI32.dll::AdjustTokenPrivileges
ADVAPI32.dll::GetTokenInformation
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CreateProcessA
ADVAPI32.dll::OpenProcessToken
KERNEL32.dll::CloseHandle
KERNEL32.dll::CreateThread
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryA
KERNEL32.dll::LoadLibraryExA
KERNEL32.dll::GetDriveTypeA
KERNEL32.dll::GetVolumeInformationA
KERNEL32.dll::GetSystemInfo
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateDirectoryA
KERNEL32.dll::CreateFileA
KERNEL32.dll::DeleteFileA
KERNEL32.dll::GetWindowsDirectoryA
KERNEL32.dll::GetSystemDirectoryA
KERNEL32.dll::GetFileAttributesA
WIN_BASE_USER_APIRetrieves Account InformationADVAPI32.dll::LookupPrivilegeValueA
WIN_REG_APICan Manipulate Windows RegistryADVAPI32.dll::RegCreateKeyExA
ADVAPI32.dll::RegOpenKeyExA
ADVAPI32.dll::RegQueryInfoKeyA
ADVAPI32.dll::RegQueryValueExA
ADVAPI32.dll::RegSetValueExA
WIN_USER_APIPerforms GUI ActionsUSER32.dll::PeekMessageA

Comments