BLACK FRIDAY: 2-for-1 offer NOVEMBER 20 - 26 See details

Lumma

31
Global rank
4 infographic chevron month
Month rank
2 infographic chevron week
Week rank
797
IOCs

Lumma is an information stealer, developed using the C programming language. It is offered for sale as a malware-as-a-service, with several plans available. It usually targets cryptocurrency wallets, login credentials, and other sensitive information on a compromised system. The malicious software regularly gets updates that improve and expand its functionality, making it a serious stealer threat.

Stealer
Type
ex-USSR
Origin
1 August, 2022
First seen
26 July, 2024
Last seen
Also known as
Lumma Stealer
LummaC2 Stealer

How to analyze Lumma with ANY.RUN

Type
ex-USSR
Origin
1 August, 2022
First seen
26 July, 2024
Last seen

IOCs

IP addresses
195.123.226.91
185.99.133.246
82.117.255.80
195.123.227.138
77.73.134.68
217.12.206.230
82.118.23.50
45.9.74.78
Hashes
65e1a8e550df1000eb91a7b679cf586efab0f24385b810f50349d50eb80ae806
8a3c04add8daebc4ff676a982763e4d59464282b80fea39d1a5ddf85e003aa77
5ecafa1ecbc54d9a7b0e2e5c646578057215a246aeec2132fe7605a078aa43ec
eeb80e95dc59793eecc2dc980c31879238db0703ecef2e4901a302c0713341c8
d0e7a341fe199dbabb5f0798dba0564e9b60e4736a405c46eafc7232cc10dc40
575d4d61e043f68fbc070d178284a2cacfb2ecaa0e352df98382e0fde7495f5f
b6a240a1f5a5465ee70d7f1f6fdb4d0174d50b594bdd20052f1c5cb575c15232
61e229c78dded9ad0b77be99f02c3538da3282a42bf344b1d182f58f09393463
0d5bc412d21a3e0ae08f17c7637867d1942d11099a018af7c3e5f45c040b28a5
caef56e10966a7754ce9ce15fc721c16ecfa498bf256fd31062591dfc55e459b
a04ed08386329b18c80d97f879e35b971398eed3de397d040e3f3a8189751de6
1be53a1bc4d191e139afb7c053b8f54af43c0338ff1eee40cd1486dfe5b787b1
7ae17d6ab6fa79af574fad70d163649b8a75aa10cb89d6da4ade87d6e2a785f0
4dc5588ac49fa183824ab585b69a491fd45d1d3b2b01f052adc5062b356e7434
2560f4997ab679d7b72bf27f367dca4bac80c9bfd5f0f37d8af5428c7d3e1817
c3c373c823b4ae381e313025cb9455dbe5c6bffff30118d7dd9b6ed3aaeb3424
a4e189e07f1db1b4826c5d539f024eb0f949a4c678ac34c71a76c0dd9e01c684
43d0cfce7ab2b0c2f6f89f0fa93083f46f290047cef0f75a0ae3a0b8742d84d8
28df5a3859116ee3aaad8c0a17425549d52d69d10cc06dac0dfaee8d874c9267
de6c4c3ddb3a3ddbcbea9124f93429bf987dcd8192e0f1b4a826505429b74560
Domains
arriveoxpzxo.shop
catchddkxozvp.shop
applyzxcksdia.shop
demandlinzei.shop
contemplateodszsv.shop
replacedoxcjzp.shop
declaredczxi.shop
conformfucdioz.shop
bindceasdiwozx.shop
potterryisiw.shop
ellaboratepwsz.xyz
towerxxuytwi.xyz
pedestriankodwu.xyz
swellfrrgwwos.xyz
penetratedpoopp.xyz
contintnetksows.shop
foodypannyjsud.shop
extorteauhhwigw.shop
parntorpkxzlp.shop
stimultaionsppzv.shop
URLs
http://195.123.226.91/c2sock
http://gstatic-node.io/c2sock
http://winhttp.dll/c2sock
http://82.117.255.80/c2sock
http://185.99.133.246/c2sock
http://aloowforest.xyz/c2sock
http://speedtestip.xyz/c2sock
http://stoppublick.xyz/c2sock
http://many-verses.xyz/c2sock
http://worldofpoetry.xyz/c2sock
http://crazypictures.xyz/c2sock
http://skicloud-my.xyz/c2sock
http://solopodvip-my.xyz/c2sock
http://clonecloud-my.xyz/c2sock
http://2flowers-my.xyz/c2sock
http://vipcloud-my.xyz/c2sock
http://agustfreeday-my.xyz/c2sock
http://gservice-node.io/c2sock
http://195.123.227.138/c2sock
http://flowers-my.xyz/c2sock
Last Seen at

Recent blog posts

post image
See Malicious Process Relationships on a Vis...
watchers 177
comments 0
post image
Brute Ratel C4 Badger Used to Load Latrodectu...
watchers 1013
comments 0
post image
Find Threats Exploiting CrowdStrike Outage w...
watchers 2994
comments 0

What is Lumma Stealer malware?

Lumma is a widely accessible malware stealer that is sold openly across Dark Web forums and Telegram channels. Although not as popular as other stealers, such as RedLine and Formbook, it has gained considerable traction among cybercriminals that focus on exfiltrating sensitive information from unsuspecting victims. Operated by a group believed to originate from former USSR countries, LummaC2 Stealer has been actively evolving since its initial emergence in 2022, getting substantial updates that enhance its capabilities.

Lumma Stealer poses a significant threat to a wide range of computer systems, targeting devices running Windows operating systems from Windows 7 up to Windows 11. This broad compatibility allows the malware to infiltrate a vast network of systems, increasing its potential reach and impact.

Since it operates under a malware-as-a-service model, Lumma Stealer is accessible to anyone with the financial means to purchase a subscription. This accessibility has contributed to the malware's widespread adoption. There are three subscription plans, each providing a varying range of features to users, including access to a command-and-control (C2) panel, which allows criminals to monitor and manage the malware's activities on compromised machines.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

Technical details of the Lumma Stealer malicious software

Lumma enables criminals to engage in a variety of illicit activities and a has a long list of capabilities, including:

  • Data exfiltration: The malware effectively gathers sensitive information from targeted applications, including login credentials, financial data, and personal details.
  • Regular updates: LummaC2 Stealer receives automatic updates on a regular basis.
  • Data log collection: Lumma Stealer collects detailed data logs from compromised endpoints, including information extracted from browsers and cryptocurrency wallets.
  • Loader capability: The stealer can drop additional malware onto compromised machines, expanding its malicious capabilities and potential impact.

Lumma Stealer has a vast range of features that make it a versatile tool for cybercriminals. For instance, all data transmitted by the stealer is decrypted on the server side, which makes it more difficult to analyze the malware’s traffic during the exfiltration process.

Another notable capability of the malware is its neighbor detection, which notifies operators about other instances of the malware running on the same system. The malware supports ARM, x86, and x64 architectures, demonstrating its cross-platform compatibility and ability to target a wide range of devices.

The stealer can also be configured to be used via a Telegram bot.

Execution process of Lumma Stealer

ANY.RUN lets us expose the malicious activities of Lumma Stealer and collect IOCs by uploading its sample to the sandbox.

Since stealers are trying their best to hide their activities, the execution chain of LummaC2 Stealer is kept as simple as possible. Therefore, there are not a lot of processes, and no usage of system tools occurs inside the infected OS. After the payload makes its way into the infected system, it immediately starts execution. The only process of the malware is responsible for carrying out all malicious activities, including data theft, C&C server communication, etc. If there is no connection with the C&C, Lumma stops its execution.

Analyze Lumma for free in a fully interactive cloud sandbox – request a demo.

Lumma graph shown in ANY.RUN The process graph of Lumma Stealer demonstrated by the ANY.RUN sandbox

Distribution methods of the Lumma Stealer malware

Lumma is utilized by numerous threat actors, both individuals and groups, who employ a variety of ways to deliver the payload to the target system.

  • Fake Software: One of the most prevalent methods used to distribute Lumma Stealer is through fake software. When unsuspecting users download and install these fake applications, they introduce the malware onto their systems.
  • Phishing Emails: Phishing emails remain a widely used attack vector for malware distribution, including Lumma Stealer. Cybercriminals craft emails that appear to be from legitimate sources, such as banks, e-commerce platforms, or social media networks.
  • Discord Messages: In some cases, Lumma Stealer operators have taken to targeting users through direct messaging on Discord, a popular chat platform. These actors engage with victims, attempting to build trust and persuade them to download infected executables under false pretenses.

Conclusion

The growing threat of LummaC2 Stealer calls for a proactive approach to cybersecurity. As this malware becomes more common, individuals and organizations must be aware of its diverse delivery methods and take steps to protect themselves. Malware analysis sandboxes, such as ANY.RUN are a valuable tool for identifying and analyzing Lumma Stealer.

ANY.RUN is an advanced tool that provides a unique way to study malware. You can interact with infected systems in a safe cloud environment to observe how the malware behaves. It goes beyond simple observation by generating a detailed report that includes IOCs and malware configuration information, enabling you to take action against malware threats.

Try ANY.RUN for free – request a demo!

HAVE A LOOK AT

Adwind screenshot
Adwind
adwind trojan
Adwind RAT, sometimes also called Unrecom, Sockrat, Frutas, jRat, and JSocket, is a Malware As A Service Remote Access Trojan that attackers can use to collect information from infected machines. It was one of the most popular RATs in the market in 2015.
Read More
Agent Tesla screenshot
Agent Tesla
agenttesla trojan rat stealer
Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.
Read More
Amadey screenshot
Amadey
amadey
Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.
Read More
Arkei screenshot
Arkei
arkei stealer
Arkei is a stealer type malware capable of collecting passwords, autosaved forms, cryptocurrency wallet credentials, and files.
Read More
AsyncRAT screenshot
AsyncRAT
asyncrat
AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.
Read More
WarZone screenshot
WarZone
warzone avemaria stealer trojan rat
WarZone RAT is a remote access trojan, which is written in C++ and offered as a malware-as-a-service. It packs a wide range of capabilities, from stealing victims’ files and passwords to capturing desktop activities. WarZone RAT is primarily distributed via phishing emails and receives regular updates from its C2.
Read More