MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fb0ae1cd8215a0094654e016e11e3ab3a16cf1495ced768281db28b2a8380d0c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LummaStealer


Vendor detections: 16


Intelligence 16 IOCs YARA 1 File information Comments

SHA256 hash: fb0ae1cd8215a0094654e016e11e3ab3a16cf1495ced768281db28b2a8380d0c
SHA3-384 hash: 104f5c006588d50928d2ef49d6798b4619227c6ea4477c5dc789a2c6be72882a9c94bde5eb3d96e6bafe814b9a5836fc
SHA1 hash: fec6aa84b3ed775fe57c167ff6ab39769e9ddcad
MD5 hash: c9c3922288e5067775237c8fc4e214be
humanhash: twenty-montana-december-fruit
File name:random.exe
Download: download sample
Signature LummaStealer
File size:1'857'536 bytes
First seen:2025-06-05 06:28:14 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 2eabe9054cad5152567f0699947a2c5b (2'852 x LummaStealer, 1'312 x Stealc, 1'026 x Healer)
ssdeep 49152:x25ZbutBxqMWnof4e8iztWlh0o3EQarsw5mI:x+xutr6of4e5y0oUzscZ
TLSH T13A85337E0DB2FB84EF1AAB75788B8BD59FD4B52BB451623E910C1462649F720793F200
TrID 42.7% (.EXE) Win32 Executable (generic) (4504/4/1)
19.2% (.EXE) OS/2 Executable (generic) (2029/13)
19.0% (.EXE) Generic Win/DOS Executable (2002/3)
18.9% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
Reporter abuse_ch
Tags:exe LummaStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
545
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
random.exe
Verdict:
Malicious activity
Analysis date:
2025-06-04 21:59:57 UTC
Tags:
amadey botnet stealer loader rdp lumma auto-reg themida telegram rhadamanthys shellcode gcleaner vidar

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.1%
Tags:
phishing autorun
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Searching for analyzing tools
Searching for the window
Connection attempt to an infection source
DNS request
Connection attempt
Sending an HTTP GET request
Using the Windows Management Instrumentation requests
Query of malicious DNS domain
Sending a TCP request to an infection source
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
packed packed packer_detected
Result
Threat name:
Amadey, LummaC Stealer, Vidar, Xmrig, RHADAMANTHYS, Vi
Detection:
malicious
Classification:
troj.spyw.expl.evad.mine.adwa
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Compiles code for process injection (via .Net compiler)
Contains functionality to inject code into remote processes
Contains functionality to start a terminal service
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Early bird code injection technique detected
Encrypted powershell cmdline option found
Found direct / indirect Syscall (likely to bypass EDR)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found stalling execution ending in API Sleep call
Found strings related to Crypto-Mining
Hides threads from debuggers
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has nameless sections
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Queues an APC in another process (thread injection)
Sample uses string decryption to hide its real strings
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Silenttrinity Stager Msbuild Activity
Suricata IDS alerts for network traffic
Switches to a custom stack to bypass stack traces
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal from password manager
Uses netstat to query active network connections and open ports
Uses the Telegram API (likely for C&C communication)
Uses threadpools to delay analysis
Writes to foreign memory regions
Yara detected Amadey
Yara detected Amadeys Clipper DLL
Yara detected AntiVM3
Yara detected Costura Assembly Loader
Yara detected LummaC Stealer
Yara detected Powershell decode and execute
Yara detected Vidar stealer
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1706905 Sample: random.exe Startdate: 05/06/2025 Architecture: WINDOWS Score: 100 133 api.telegram.org 2->133 135 lepidobdkn.digital 2->135 137 12 other IPs or domains 2->137 157 Suricata IDS alerts for network traffic 2->157 159 Found malware configuration 2->159 161 Malicious sample detected (through community Yara rule) 2->161 165 21 other signatures 2->165 13 random.exe 1 2->13         started        18 varen.exe 2->18         started        20 ramez.exe 2->20         started        22 2 other processes 2->22 signatures3 163 Uses the Telegram API (likely for C&C communication) 133->163 process4 dnsIp5 153 185.156.72.2, 49692, 49710, 49718 ITDELUXE-ASRU Russian Federation 13->153 155 lepidobdkn.digital 195.82.147.188, 443, 49681, 49682 DREAMTORRENT-CORP-ASRU Russian Federation 13->155 119 C:\Users\user\...\5RPH2E6JV52LEFF2PS.exe, PE32 13->119 dropped 227 Detected unpacking (changes PE section rights) 13->227 229 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 13->229 231 Query firmware table information (likely to detect VMs) 13->231 237 7 other signatures 13->237 24 5RPH2E6JV52LEFF2PS.exe 4 13->24         started        121 C:\Users\user\AppData\...\c2aa044c71.exe, PE32 18->121 dropped 123 C:\Users\user\AppData\Local\...\random[1].exe, PE32 18->123 dropped 233 Contains functionality to start a terminal service 18->233 28 c2aa044c71.exe 18->28         started        235 Hides threads from debuggers 20->235 31 NETSTAT.EXE 22->31         started        file6 signatures7 process8 dnsIp9 109 C:\Users\user\AppData\Local\...\ramez.exe, Unknown 24->109 dropped 217 Detected unpacking (changes PE section rights) 24->217 219 Contains functionality to start a terminal service 24->219 221 Found stalling execution ending in API Sleep call 24->221 225 2 other signatures 24->225 33 ramez.exe 54 24->33         started        145 185.156.72.196 ITDELUXE-ASRU Russian Federation 28->145 147 drive.usercontent.google.com 142.250.114.132 GOOGLEUS United States 28->147 111 C:\Users\user\AppData\Local\Temp\...\YCL.exe, PE32 28->111 dropped 113 C:\Users\user\...\Bunifu_UI_v1.5.3.dll, PE32 28->113 dropped 115 C:\Users\user\AppData\Local\...\dll[1], PE32 28->115 dropped 117 C:\Users\user\AppData\Local\...\soft[1], PE32 28->117 dropped 223 Multi AV Scanner detection for dropped file 28->223 149 23.95.245.178 AS-COLOCROSSINGUS United States 31->149 151 127.0.0.1 unknown unknown 31->151 38 conhost.exe 31->38         started        file10 signatures11 process12 dnsIp13 129 185.156.72.61, 49734, 49738, 49741 ITDELUXE-ASRU Russian Federation 33->129 131 185.156.72.96, 49693, 49694, 49695 ITDELUXE-ASRU Russian Federation 33->131 97 C:\Users\user\AppData\...\68eced0540.exe, PE32 33->97 dropped 99 C:\Users\user\AppData\...\551a309aa0.exe, PE32 33->99 dropped 101 C:\Users\user\AppData\Local\...\08IyOOF.exe, PE32+ 33->101 dropped 103 24 other malicious files 33->103 dropped 167 Detected unpacking (changes PE section rights) 33->167 169 Hides threads from debuggers 33->169 40 8f2lGlV.exe 33->40         started        43 Md7DcfL.exe 33->43         started        45 tdxVgQi.exe 1 33->45         started        47 7 other processes 33->47 file14 signatures15 process16 dnsIp17 189 Multi AV Scanner detection for dropped file 40->189 191 Found many strings related to Crypto-Wallets (likely being stolen) 40->191 193 Encrypted powershell cmdline option found 40->193 207 2 other signatures 40->207 51 8f2lGlV.exe 40->51         started        195 Writes to foreign memory regions 43->195 197 Allocates memory in foreign processes 43->197 199 Injects a PE file into a foreign processes 43->199 55 MSBuild.exe 43->55         started        67 4 other processes 43->67 57 MSBuild.exe 45->57         started        59 conhost.exe 45->59         started        127 179.43.141.35 PLI-ASCH Panama 47->127 125 C:\Users\user\AppData\Local\...\varen.exe, PE32 47->125 dropped 201 Antivirus detection for dropped file 47->201 203 Early bird code injection technique detected 47->203 205 Contains functionality to start a terminal service 47->205 209 6 other signatures 47->209 61 MSBuild.exe 47->61         started        63 MSBuild.exe 47->63         started        65 MSBuild.exe 47->65         started        69 4 other processes 47->69 file18 signatures19 process20 dnsIp21 139 51.e1.4t.com 116.202.3.169 HETZNER-ASDE Germany 51->139 171 Encrypted powershell cmdline option found 51->171 71 powershell.exe 51->71         started        75 powershell.exe 51->75         started        77 chrome.exe 51->77         started        79 3 other processes 51->79 173 Query firmware table information (likely to detect VMs) 55->173 175 Tries to harvest and steal browser information (history, passwords, etc) 55->175 177 Tries to steal Crypto Currency Wallets 55->177 179 Tries to steal from password manager 55->179 181 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 57->181 183 Tries to harvest and steal ftp login credentials 61->183 141 t.me 149.154.167.99, 443, 49722, 49735 TELEGRAMRU United Kingdom 63->141 185 Multi AV Scanner detection for dropped file 69->185 187 Contains functionality to start a terminal service 69->187 signatures22 process23 file24 105 C:\Users\user\AppData\...\ydhkvy22.cmdline, Unicode 71->105 dropped 211 Writes to foreign memory regions 71->211 213 Compiles code for process injection (via .Net compiler) 71->213 215 Creates a thread in another existing process (thread injection) 71->215 81 csc.exe 71->81         started        84 conhost.exe 71->84         started        107 C:\Users\user\AppData\Local\...\4vqclkn2.0.cs, Unicode 75->107 dropped 86 conhost.exe 75->86         started        88 chrome.exe 77->88         started        91 conhost.exe 79->91         started        signatures25 process26 dnsIp27 95 C:\Users\user\AppData\Local\...\ydhkvy22.dll, PE32 81->95 dropped 93 cvtres.exe 81->93         started        143 www.google.com 142.250.113.105 GOOGLEUS United States 88->143 file28 process29
Threat name:
Win32.Trojan.Amadey
Status:
Malicious
First seen:
2025-06-05 00:27:11 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
31 of 38 (81.58%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
lummastealer
Similar samples:
Result
Malware family:
Score:
  10/10
Tags:
family:lumma defense_evasion discovery spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
System Location Discovery: System Language Discovery
Suspicious use of NtSetInformationThreadHideFromDebugger
Checks installed software on the system
Checks BIOS information in registry
Identifies Wine through registry keys
Reads user/profile data of local email clients
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Lumma Stealer, LummaC
Lumma family
Malware Config
C2 Extraction:
https://battlefled.top/gaoi
https://narrathfpt.top/tekq
https://escczlv.top/bufi
https://localixbiw.top/zlpa
https://korxddl.top/qidz
https://tinklertjp.bet/nzaf
https://diecam.top/laur/api
https://citellcagt.top/gjtu
https://witchdbhy.run/pzal
Unpacked files
SH256 hash:
fb0ae1cd8215a0094654e016e11e3ab3a16cf1495ced768281db28b2a8380d0c
MD5 hash:
c9c3922288e5067775237c8fc4e214be
SHA1 hash:
fec6aa84b3ed775fe57c167ff6ab39769e9ddcad
SH256 hash:
297366647b9a2f0c73d1b7b8527e6d9a86ea8d2753607fcfd88ab6c6164a7613
MD5 hash:
8533c6d11bcb6a3d485cda6d0e0c7245
SHA1 hash:
ffe7aff5fd245c757845b8b640aa57e33c41137d
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

LummaStealer

Executable exe fb0ae1cd8215a0094654e016e11e3ab3a16cf1495ced768281db28b2a8380d0c

(this sample)

  
Delivery method
Distributed via web download

Comments