BLACK FRIDAY: 2-for-1 offer NOVEMBER 20 - 26 See details

Lumma

23
Global rank
1
Month rank
1
Week rank
0
IOCs

Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat.

Stealer
Type
ex-USSR
Origin
1 August, 2022
First seen
20 September, 2024
Last seen
Also known as
Lumma Stealer
LummaC2 Stealer

How to analyze Lumma with ANY.RUN

Type
ex-USSR
Origin
1 August, 2022
First seen
20 September, 2024
Last seen

IOCs

IP addresses
195.123.227.138
185.99.133.246
195.123.226.91
82.117.255.80
77.73.134.68
217.12.206.230
82.118.23.50
45.9.74.78
Hashes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lighterepisodeheighte.fun
controlopposedcallyo.shop
detectordiscusser.shop
pooreveningfuseor.pw
technologyenterdo.shop
problemregardybuiwo.fun
edurestunningcrackyow.fun
associationokeo.shop
turkeyunlikelyofw.shop
evoliutwoqm.shop
caffegclasiqwp.shop
traineiwnqo.shop
largerryskwhq.shop
stamppreewntnq.shop
locatedblsoqp.shop
millyscroqwp.shop
stagedchheiqwo.shop
condedqpwqm.shop
futureddospzmvq.shop
basedsymsotp.shop
URLs
http://185.99.133.246/c2sock
http://195.123.226.91/c2sock
http://gstatic-node.io/c2sock
http://winhttp.dll/c2sock
http://82.117.255.80/c2sock
http://aloowforest.xyz/c2sock
http://speedtestip.xyz/c2sock
http://stoppublick.xyz/c2sock
http://many-verses.xyz/c2sock
http://worldofpoetry.xyz/c2sock
http://crazypictures.xyz/c2sock
http://skicloud-my.xyz/c2sock
http://solopodvip-my.xyz/c2sock
http://clonecloud-my.xyz/c2sock
http://2flowers-my.xyz/c2sock
http://vipcloud-my.xyz/c2sock
http://agustfreeday-my.xyz/c2sock
http://gservice-node.io/c2sock
http://195.123.227.138/c2sock
http://flowers-my.xyz/c2sock
Last Seen at

Recent blog posts

post image
What is Spearphishing: Definition, Techniques...
watchers 944
comments 0
post image
How to Collect Threat Intelligence Using Sear...
watchers 1397
comments 0
post image
ANY.RUN Now Integrates with Splunk!
watchers 664
comments 0

What is Lumma Stealer malware?

Lumma is a widely accessible malware stealer that is sold openly across Dark Web forums and Telegram channels. Although not as popular as other stealers, such as RedLine and Formbook, it has gained considerable traction among cybercriminals that focus on exfiltrating sensitive information from unsuspecting victims. Operated by a group believed to originate from former USSR countries, LummaC2 Stealer has been actively evolving since its initial emergence in 2022, getting substantial updates that enhance its capabilities.

Lumma Stealer poses a significant threat to a wide range of computer systems, targeting devices running Windows operating systems from Windows 7 up to Windows 11. This broad compatibility allows the malware to infiltrate a vast network of systems, increasing its potential reach and impact.

Since it operates under a malware-as-a-service model, Lumma Stealer is accessible to anyone with the financial means to purchase a subscription. This accessibility has contributed to the malware's widespread adoption. There are three subscription plans, each providing a varying range of features to users, including access to a command-and-control (C2) panel, which allows criminals to monitor and manage the malware's activities on compromised machines.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

Technical details of the Lumma Stealer malicious software

Lumma enables criminals to engage in a variety of illicit activities and a has a long list of capabilities, including:

  • Data exfiltration: The malware effectively gathers sensitive information from targeted applications, including login credentials, financial data, and personal details.
  • Regular updates: LummaC2 Stealer receives automatic updates on a regular basis.
  • Data log collection: Lumma Stealer collects detailed data logs from compromised endpoints, including information extracted from browsers and cryptocurrency wallets.
  • Loader capability: The stealer can drop additional malware onto compromised machines, expanding its malicious capabilities and potential impact.

Lumma Stealer has a vast range of features that make it a versatile tool for cybercriminals. For instance, all data transmitted by the stealer is decrypted on the server side, which makes it more difficult to analyze the malware’s traffic during the exfiltration process.

Another notable capability of the malware is its neighbor detection, which notifies operators about other instances of the malware running on the same system. The malware supports ARM, x86, and x64 architectures, demonstrating its cross-platform compatibility and ability to target a wide range of devices.

The stealer can also be configured to be used via a Telegram bot.

Execution process of Lumma Stealer

ANY.RUN lets us expose the malicious activities of Lumma Stealer and collect IOCs by uploading its sample to the sandbox.

Since stealers are trying their best to hide their activities, the execution chain of LummaC2 Stealer is kept as simple as possible. Therefore, there are not a lot of processes, and no usage of system tools occurs inside the infected OS. After the payload makes its way into the infected system, it immediately starts execution. The only process of the malware is responsible for carrying out all malicious activities, including data theft, C&C server communication, etc. If there is no connection with the C&C, Lumma stops its execution.

Analyze Lumma for free in a fully interactive cloud sandbox – request a demo.

Lumma graph shown in ANY.RUN The process graph of Lumma Stealer demonstrated by the ANY.RUN sandbox

Distribution methods of the Lumma Stealer malware

Lumma is utilized by numerous threat actors, both individuals and groups, who employ a variety of ways to deliver the payload to the target system.

  • Fake Software: One of the most prevalent methods used to distribute Lumma Stealer is through fake software. When unsuspecting users download and install these fake applications, they introduce the malware onto their systems.
  • Phishing Emails: Phishing emails remain a widely used attack vector for malware distribution, including Lumma Stealer. Cybercriminals craft emails that appear to be from legitimate sources, such as banks, e-commerce platforms, or social media networks.
  • Discord Messages: In some cases, Lumma Stealer operators have taken to targeting users through direct messaging on Discord, a popular chat platform. These actors engage with victims, attempting to build trust and persuade them to download infected executables under false pretenses.

Conclusion

The growing threat of LummaC2 Stealer calls for a proactive approach to cybersecurity. As this malware becomes more common, individuals and organizations must be aware of its diverse delivery methods and take steps to protect themselves. Malware analysis sandboxes, such as ANY.RUN are a valuable tool for identifying and analyzing Lumma Stealer.

ANY.RUN is an advanced tool that provides a unique way to study malware. You can interact with infected systems in a safe cloud environment to observe how the malware behaves. It goes beyond simple observation by generating a detailed report that includes IOCs and malware configuration information, enabling you to take action against malware threats.

Try ANY.RUN for free – request a demo!

HAVE A LOOK AT

Adwind screenshot
Adwind
adwind trojan
Adwind RAT, sometimes also called Unrecom, Sockrat, Frutas, jRat, and JSocket, is a Malware As A Service Remote Access Trojan that attackers can use to collect information from infected machines. It was one of the most popular RATs in the market in 2015.
Read More
Agent Tesla screenshot
Agent Tesla
agenttesla trojan rat stealer
Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.
Read More
Amadey screenshot
Amadey
amadey
Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.
Read More
Arkei screenshot
Arkei
arkei stealer
Arkei is a stealer type malware capable of collecting passwords, autosaved forms, cryptocurrency wallet credentials, and files.
Read More
AsyncRAT screenshot
AsyncRAT
asyncrat
AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.
Read More
WarZone screenshot
WarZone
warzone avemaria stealer trojan rat
WarZone RAT is a remote access trojan, which is written in C++ and offered as a malware-as-a-service. It packs a wide range of capabilities, from stealing victims’ files and passwords to capturing desktop activities. WarZone RAT is primarily distributed via phishing emails and receives regular updates from its C2.
Read More