BLACK FRIDAY: 2-for-1 offer NOVEMBER 20 - 26 See details

Lumma

34
Global rank
23 infographic chevron month
Month rank
20 infographic chevron week
Week rank
555
IOCs

Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat.

Stealer
Type
ex-USSR
Origin
1 August, 2022
First seen
28 April, 2024
Last seen
Also known as
Lumma Stealer
LummaC2 Stealer

How to analyze Lumma with ANY.RUN

Type
ex-USSR
Origin
1 August, 2022
First seen
28 April, 2024
Last seen

IOCs

IP addresses
185.99.133.246
82.117.255.80
195.123.227.138
77.73.134.68
195.123.226.91
217.12.206.230
82.118.23.50
45.9.74.78
Hashes
b6aa024e2681961c93d29f8600baa935b545e274db48eb832de1f3dea17db546
821ca194a12d0085b5ea043efc6417e53227244da585af0bcc8995e1946cbebd
e4ac07e5b639f151bc37665279fc9f8b63858aa20e159d24ed9afaaadf5f02b2
dc0a7f961d82c5c1ec54f3999dbc3c1ff2047cc010333adbd6e7652f7c9efc3c
8464c438205f7da655e6745d9136a341845122bc5c39ad405d5d7ef0a349c09a
eb54d3eb7908c34f64939c54eedd8a5f14765df8f6751c05247c583d07efacae
0e922d6c34d784be5bc4967aad1d28a6a6651c6ace414a7a25a508b15b163dca
d1099e34768deda9de54d0f30fddca20f37aa62a2949bf1bbbf3f649f4f47866
2cf9107daea9a6c86b27972b33c75f60b1e89a4be3463a64729a94c2249b4199
e45ba4f91807634b98684857852ff1cccb45a727286d22f9a29732804b1ac88c
b14ddf64ace0b5f0d7452be28d07355c1c6865710dbed84938e2af48ccaa46cf
13d6506315f50ac83da1fb9a5b04e36ffe2cd414118322fc9bf3344c46975334
8de84ec3f5e36aaa199abb385d6839c10e4c134e060425bf126b96e6082b0987
108d95e016b7539454dba271b9e8dd7f00284fc9fe233aa92eda9e26084d1c02
929f7b467d96d8d9c73bfa9b8adf758c1b3993c9438f23368c69e1201beea622
fd0b63f81551211eeae8b13b349ca4883b2981c51a42781ea82f5281b6a9bcde
cf8ac11e13453e51c75eaaaff966b5eedcfb5ac4aa0c4e36826ff0faf032663f
9f6b13e322da58d0b60a77bbaf94e78ce45ffb0637612b177170bd5f76d8c6d5
14e38e65a442ad099ceb65460504c5f9b7b311f9fb6f5440e2ce9f2f7cbfed31
35de04e339d38073cb60f31b07e58326953236f1e72a2a023bb699619f7493d8
Domains
suitcaseacanehalk.shop
entitlementappwo.shop
wifeplasterbakewis.shop
economicscreateojsu.shop
bordersoarmanusjuw.shop
absentconvicsjawun.shop
mealplayerpreceodsju.shop
pushjellysingeywus.shop
palmeventeryjusk.shop
superyupp.fun
buggubucks.fun
gapi-node.io
castomarmor.xyz
sofahuntingslidedine.shop
modestessayevenmilwek.shop
triangleseasonbenchwj.shop
liabilityarrangemenyit.shop
secretionsuitcasenioise.shop
claimconcessionrebe.shop
peasanthovecapspll.shop
URLs
http://195.123.226.91/c2sock
http://gstatic-node.io/c2sock
http://winhttp.dll/c2sock
http://82.117.255.80/c2sock
http://185.99.133.246/c2sock
http://aloowforest.xyz/c2sock
http://speedtestip.xyz/c2sock
http://stoppublick.xyz/c2sock
http://many-verses.xyz/c2sock
http://worldofpoetry.xyz/c2sock
http://crazypictures.xyz/c2sock
http://skicloud-my.xyz/c2sock
http://solopodvip-my.xyz/c2sock
http://clonecloud-my.xyz/c2sock
http://2flowers-my.xyz/c2sock
http://vipcloud-my.xyz/c2sock
http://agustfreeday-my.xyz/c2sock
http://gservice-node.io/c2sock
http://195.123.227.138/c2sock
http://flowers-my.xyz/c2sock
Last Seen at

Recent blog posts

post image
New Redline Version: Uses Lua Bytecode, Propa...
watchers 133
comments 0
post image
Find Malware by File Contents with YARA Searc...
watchers 1049
comments 0
post image
Cybercriminals Exploit Google Ads to Spread I...
watchers 481
comments 0

What is Lumma Stealer malware?

Lumma is a widely accessible malware stealer that is sold openly across Dark Web forums and Telegram channels. Although not as popular as other stealers, such as RedLine and Formbook, it has gained considerable traction among cybercriminals that focus on exfiltrating sensitive information from unsuspecting victims. Operated by a group believed to originate from former USSR countries, LummaC2 Stealer has been actively evolving since its initial emergence in 2022, getting substantial updates that enhance its capabilities.

Lumma Stealer poses a significant threat to a wide range of computer systems, targeting devices running Windows operating systems from Windows 7 up to Windows 11. This broad compatibility allows the malware to infiltrate a vast network of systems, increasing its potential reach and impact.

Since it operates under a malware-as-a-service model, Lumma Stealer is accessible to anyone with the financial means to purchase a subscription. This accessibility has contributed to the malware's widespread adoption. There are three subscription plans, each providing a varying range of features to users, including access to a command-and-control (C2) panel, which allows criminals to monitor and manage the malware's activities on compromised machines.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

Technical details of the Lumma Stealer malicious software

Lumma enables criminals to engage in a variety of illicit activities and a has a long list of capabilities, including:

  • Data exfiltration: The malware effectively gathers sensitive information from targeted applications, including login credentials, financial data, and personal details.
  • Regular updates: LummaC2 Stealer receives automatic updates on a regular basis.
  • Data log collection: Lumma Stealer collects detailed data logs from compromised endpoints, including information extracted from browsers and cryptocurrency wallets.
  • Loader capability: The stealer can drop additional malware onto compromised machines, expanding its malicious capabilities and potential impact.

Lumma Stealer has a vast range of features that make it a versatile tool for cybercriminals. For instance, all data transmitted by the stealer is decrypted on the server side, which makes it more difficult to analyze the malware’s traffic during the exfiltration process.

Another notable capability of the malware is its neighbor detection, which notifies operators about other instances of the malware running on the same system. The malware supports ARM, x86, and x64 architectures, demonstrating its cross-platform compatibility and ability to target a wide range of devices.

The stealer can also be configured to be used via a Telegram bot.

Execution process of Lumma Stealer

ANY.RUN lets us expose the malicious activities of Lumma Stealer and collect IOCs by uploading its sample to the sandbox.

Since stealers are trying their best to hide their activities, the execution chain of LummaC2 Stealer is kept as simple as possible. Therefore, there are not a lot of processes, and no usage of system tools occurs inside the infected OS. After the payload makes its way into the infected system, it immediately starts execution. The only process of the malware is responsible for carrying out all malicious activities, including data theft, C&C server communication, etc. If there is no connection with the C&C, Lumma stops its execution.

Analyze Lumma for free in a fully interactive cloud sandbox – request a demo.

Lumma graph shown in ANY.RUN The process graph of Lumma Stealer demonstrated by the ANY.RUN sandbox

Distribution methods of the Lumma Stealer malware

Lumma is utilized by numerous threat actors, both individuals and groups, who employ a variety of ways to deliver the payload to the target system.

  • Fake Software: One of the most prevalent methods used to distribute Lumma Stealer is through fake software. When unsuspecting users download and install these fake applications, they introduce the malware onto their systems.
  • Phishing Emails: Phishing emails remain a widely used attack vector for malware distribution, including Lumma Stealer. Cybercriminals craft emails that appear to be from legitimate sources, such as banks, e-commerce platforms, or social media networks.
  • Discord Messages: In some cases, Lumma Stealer operators have taken to targeting users through direct messaging on Discord, a popular chat platform. These actors engage with victims, attempting to build trust and persuade them to download infected executables under false pretenses.

Conclusion

The growing threat of LummaC2 Stealer calls for a proactive approach to cybersecurity. As this malware becomes more common, individuals and organizations must be aware of its diverse delivery methods and take steps to protect themselves. Malware analysis sandboxes, such as ANY.RUN are a valuable tool for identifying and analyzing Lumma Stealer.

ANY.RUN is an advanced tool that provides a unique way to study malware. You can interact with infected systems in a safe cloud environment to observe how the malware behaves. It goes beyond simple observation by generating a detailed report that includes IOCs and malware configuration information, enabling you to take action against malware threats.

Try ANY.RUN for free – request a demo!

HAVE A LOOK AT

Adwind screenshot
Adwind
adwind trojan
Adwind RAT, sometimes also called Unrecom, Sockrat, Frutas, jRat, and JSocket, is a Malware As A Service Remote Access Trojan that attackers can use to collect information from infected machines. It was one of the most popular RATs in the market in 2015.
Read More
Agent Tesla screenshot
Agent Tesla
agenttesla trojan rat stealer
Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.
Read More
Amadey screenshot
Amadey
amadey
Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.
Read More
Arkei screenshot
Arkei
arkei stealer
Arkei is a stealer type malware capable of collecting passwords, autosaved forms, cryptocurrency wallet credentials, and files.
Read More
AsyncRAT screenshot
AsyncRAT
asyncrat
AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.
Read More
WarZone screenshot
WarZone
warzone avemaria stealer trojan rat
WarZone RAT is a remote access trojan, which is written in C++ and offered as a malware-as-a-service. It packs a wide range of capabilities, from stealing victims’ files and passwords to capturing desktop activities. WarZone RAT is primarily distributed via phishing emails and receives regular updates from its C2.
Read More

Our website uses cookies. By visiting the pages of the site, you agree to our Privacy Policy