Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

Lu0Bot

123
Global rank
83 infographic chevron month
Month rank
80 infographic chevron week
Week rank
0
IOCs

Lu0Bot is a Node.js malware that was first discovered in February 2021. It is a type of Trojan that primarily acts as a stealer by responding to commands from a command-and-control (C2) server and transmitting encrypted system data. It can also operate as a DDoS bot. Lu0Bot employs multiple obfuscation techniques to avoid detection and make analysis more difficult.

Trojan
Type
Unknown
Origin
1 February, 2021
First seen
20 December, 2025
Last seen

How to analyze Lu0Bot with ANY.RUN

Type
Unknown
Origin
1 February, 2021
First seen
20 December, 2025
Last seen

IOCs

IP addresses
5.188.206.211
45.141.26.119
45.141.27.41
Hashes
9c5898b1b354b139794f10594e84e94e991971a54d179b2e9f746319ffac56aa
Domains
dmz24.fun
zdm85.shop
pom39.fun
fuk09.fun
tes03.xyz
fast-difficult.monster
hri9.xyz
vhi46.shop
oun96.fun
hri2.xyz
xdk03.fun
hri10.xyz
llw18.fun
cdh80.fun
xio23.com
ykf88.fun
byk31.shop
irj55.shop
lu0.viewdns.net
zgg58.shop
Last Seen at
Last Seen at

Recent blog posts

post image
Year in Review by ANY.RUN: Key Threats, Solut...
watchers 1786
comments 0
post image
5 Ways Threat Intelligence Drives ROI in SOCs...
watchers 402
comments 0
post image
SOC Leader’s Playbook: 3 Practical Steps to F...
watchers 447
comments 0

What is Lu0Bot malware?

Lu0Bot is a trojan that was first observed in 2021. Although less widely used than other trojan malware, such as Agent Tesla, it has the potential to inflict serious damage on infected systems.

A notable feature of Lu0Bot is its use of Node.js, an unusual programming language choice for malware. However, this unconventional approach provides Lu0Bot with versatility compared to most malicious programs that are usually developed using the .NET framework, which is limited to Windows systems.

Despite being a highly capable threat, Lu0Bot has a relatively low level of activity. Currently, its primary function is data harvesting, but it can also be used as a DDoS attack bot and may have other capabilities.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

Technical details of the Lu0Bot malicious software

Once Lu0Bot is fully deployed on the system, it can engage in:

  • Keystroke recording: It can perform keylogging and record the keys that are pressed by the user, for instance, when they enter their login credentials.
  • Identity theft: It can steal the victim’s personal information, including credit card numbers and other sensitive data.
  • System control: Using Lu0Bot, attackers can execute a wide variety of activities, as the malicious software is capable of establishing near-full control over the device.
  • DDoS attacks: The malware can exploit the compromised system and use it to participate in a distributed denial-of-service (DDoS) attack.

Lu0Bot is highly obfuscated, meaning that its code is deliberately made difficult to read and understand in order to prevent or obstruct analysis. It uses several encryption algorithms, including custom ones.

By comparing Lu0Bot samples from 2021 and 2023, it becomes clear that the software is being continuously updated by its developers.

Read a detailed analysis of a Lu0Bot sample in our blog.

Execution process of Lu0Bot

In order to see how Lu0Bot operates and collect up-to-date IOCs, let’s examine one of its samples in the ANY.RUN sandbox.

Analyze malware for free in a fully interactive cloud sandbox – sign up now!

The execution chain of this malware family is relatively straightforward. After the payload executes, it uses CMD to copy and initiate the main malware process. This process is responsible for carrying out all malicious activities, including data theft, C&C server communication, and, in this case, gathering process information using WMIC.EXE.

Lu0botprocess tree shown in ANY.RUN Lu0Bot's process tree demonstrated in ANY.RUN

Distribution methods of the Lu0Bot malware

In the early days, Lu0Bot was primarily dropped by GCleaner, a specialized software for deploying second-stage payloads. Yet, today, the main method of delivery for this malware is phishing emails. Essentially, attackers employ various social engineering techniques in order to get their victims to download malicious email attachments or open unsafe links and trigger the infection chain reaction on their systems.

Conclusion

Despite being a known threat, the true scale of Lu0Bot's operations remains unknown. This makes it a dangerous malware capable of dealing a significant blow to any infrastructure, if not addressed proactively. Therefore, organizations must implement proper security measures to prepare for Lu0Bot attacks.

One of the most effective ways to prevent a Lu0Bot attack is to check any incoming files and links, especially those sent by unknown senders, in the ANY.RUN sandbox. It is a malware sandbox that lets you quickly understand if the file or link your are dealing with is malicious or not.

ANY.RUN is fully interactive, enabling you to engage with the infected system like you would on your own computer but in a safe cloud environment to fully understand the behavior of the malware. It also provides comprehensive reports that include IOCs and malware configs.

Try ANY.RUN for free – request a demo!.

HAVE A LOOK AT

Keylogger screenshot
Keylogger
keylogger
A keylogger is a type of spyware that infects a system and has the ability to record every keystroke made on the device. This lets attackers collect personal information of victims, which may include their online banking credentials, as well as personal conversations. The most widespread vector of attack leading to a keylogger infection begins with a phishing email or link. Keylogging is also often present in remote access trojans as part of an extended set of malicious tools.
Read More
BlackMoon screenshot
BlackMoon
blackmoon
BlackMoon also known as KrBanker is a trojan aimed at stealing payment credentials. It specializes in man-in-the-browser (MitB) attacks, web injection, and credential theft to compromise users' online banking accounts. It was first noticed in early 2014 attacking banks in South Korea and has impressively evolved since by adding a number of new infiltration techniques and information stealing methods.
Read More
Cerber screenshot
Cerber
cerber
Cerber is a Ransomware-as-a-Service (RaaS) that appeared in 2016, spread quickly and has been evolving since. It became well-known for its file encryption, offline capabilities, and sophisticated evasion techniques. It primarily targets enterprises, financial institutions, and government entities, encrypting their data and demanding ransom payments in Bitcoin. It also targets everyday users encrypting personal files (photos, documents) with the risk of their permanent loss.
Read More
DeerStealer screenshot
DeerStealer
deerstealer
DeerStealer is an information-stealing malware discovered in 2024 by ANY.RUN, primarily targeting sensitive data such as login credentials, browser history, and cryptocurrency wallet details. It is often distributed through phishing campaigns and fake Google ads that mimic legitimate platforms like Google Authenticator. Once installed, it exfiltrates the stolen data to a remote command and control (C2) server. DeerStealer’s ability to disguise itself as legitimate downloads makes it particularly dangerous for unsuspecting users.
Read More
ACR Stealer screenshot
ACR Stealer is a modern information-stealing malware designed to harvest sensitive data from infected devices. Like other infostealers, it targets credentials, financial details, browser data, and files, enabling cybercriminals to monetize stolen information through direct fraud or underground market sales.
Read More
Havoc screenshot
Havoc
havoc
Havoc is an advanced post-exploitation framework used by hackers to take control of a system once they've breached it. With Havoc, attackers can run commands remotely, inject malicious processes, and access sensitive data. It's often used in targeted attacks, allowing cybercriminals to stay hidden in a network while stealing information or launching further attacks. Its flexibility and ability to bypass detection make it a serious threat, especially in environments that rely on traditional security tools.
Read More