HomeSample Page

Sample Page Title


ESET has collaborated with Microsoft, BitSight, Lumen, Cloudflare, CleanDNS, and GMO Registry in a worldwide disruption operation towards Lumma Stealer, an notorious malware-as-a-service (MaaS) infostealer. The operation focused Lumma Stealer infrastructure with all identified C&C servers up to now 12 months, rendering the exfiltration community, or a big a part of it, nonoperational.

Key factors of this blogpost:

  • ESET took half in a coordinated world operation to disrupt Lumma Stealer.
  • ESET supplied technical evaluation and statistical info, and extracted important knowledge from tens of 1000’s of malware samples.
  • We offer an outline of the Lumma Stealer MaaS ecosystem.
  • We additionally present technical evaluation and an outline of the evolution of Lumma Stealer’s key static and dynamic properties, which had been crucial to the disruption effort.

Disruption contribution

ESET automated methods processed tens of 1000’s of Lumma Stealer samples, dissecting them to extract key components, comparable to C&C servers and affiliate identifiers. This allowed us to repeatedly monitor Lumma Stealer’s exercise, observe improvement updates, cluster associates, and extra.

Infostealer malware households, like Lumma Stealer, are sometimes only a foreshadowing of a future, way more devastating assault. Harvested credentials are a valued commodity within the cybercrime underground, bought by preliminary entry brokers to numerous different cybercriminals, together with ransomware associates. Lumma Stealer has been probably the most prevalent infostealers over the previous two years, and ESET telemetry (see Determine 1) confirms that it has left no a part of the world untouched.

Figure 1. Lumma Stealer detection rate (data since July 2024)
Determine 1. Lumma Stealer detection price (knowledge since July 2024)

Lumma Stealer builders had been actively creating and sustaining their malware. We’ve recurrently seen code updates starting from minor bug fixes to finish substitute of string encryption algorithms and adjustments to the community protocol. The operators additionally actively maintained the shared exfiltration community infrastructure. Between June 17th, 2024 and Could 1st, 2025, we noticed a complete of three,353 distinctive C&C domains, averaging roughly 74 new domains rising every week together with occasional updates to Telegram-based dead-drop resolvers (see Determine 2). We focus on the small print of the community infrastructure later within the blogpost.

Figure 2. Weekly counts of new C&C domains
Determine 2. Weekly counts of recent C&C domains

This ongoing evolution underscores the numerous risk posed by Lumma Stealer and highlights the significance and complexity of the disruption effort.

Background

Over the previous two years, Lumma Stealer (also referred to as LummaC or LummaC2) has emerged as probably the most lively infostealers within the cybercrime ecosystem, changing into a well-liked instrument amongst cybercriminals as a result of its lively improvement of malware options and its infrastructure being bought as a service.

Malware as a service

Lumma Stealer adopts the idea of malware as a service (MaaS), the place associates pay a month-to-month payment, primarily based on their tier, to obtain the newest malware builds and the community infrastructure crucial for knowledge exfiltration. Associates have entry to a administration panel with a user-friendly interface the place they will obtain exfiltrated knowledge and harvested credentials.

The tiered subscription mannequin ranges from USD 250 to USD 1,000 per thirty days, every with more and more refined options. Decrease tiers embrace primary filtering and log obtain choices, whereas greater tiers supply customized knowledge assortment, evasion instruments, and early entry to new options. The costliest plan emphasizes stealth and flexibility, providing distinctive construct technology and diminished detection.

The operators of Lumma Stealer have additionally created a Telegram market with a ranking system for associates to promote stolen knowledge with out intermediaries. {The marketplace} has been effectively documented in Cybereason analysis. Furthermore, they keep public documentation of the administration panel for associates and periodically share updates and fixes on hacking boards, as proven in Determine 3.

Figure 3. The official LummaStealer documentation – machine translated from Russian to English
Determine 3. The official Lumma Stealer documentation – machine translated from Russian to English (Could 12th, 2025)

Open documentation not solely helps associates with much less expertise to make use of the malware service, but additionally offers worthwhile insights for safety researchers. Builders give attention to malware builds, knowledge pipelining, and infrastructure upkeep, whereas associates are chargeable for distributing the malware. This info, mixed with the service’s reputation, leads to all kinds of compromise vectors.

Frequent distribution strategies embrace phishing, cracked software program, and different malware downloaders together with SmokeLoader, DarkGate, Amadey, Vidar, and others. Standard phishing schemes contain ClickFix or pretend CAPTCHA net pages, fraudulent boards with cracked software program, pretend GitHub repositories, fraudulent hyperlinks on Reddit boards, and lots of extra.

Technical evaluation

Quite a few public analyses have already been written about Lumma Stealer and its compromise vectors. Our focus right here, nonetheless, is on the elements related to the disruption. On this part, we are going to briefly introduce the important thing static and dynamic properties that we’ve been actively extracting from Lumma Stealer.

Static properties of Lumma Stealer

Numerous info comes embedded in Lumma Stealer malware samples. This naturally presents an excellent goal for automated extraction. Moreover the plain knowledge of curiosity – C&C server domains – the samples additionally include identifier strings that tie the pattern to a selected affiliate and a marketing campaign, and an non-compulsory identifier resulting in a customized dynamic configuration. These identifiers are utilized in community communication with the C&C server throughout knowledge exfiltration and requests for dynamic configuration. Within the sections beneath, we take a look at these properties in depth.

C&C domains

Every Lumma Stealer pattern comprises an inventory of 9 encrypted C&C domains. Whereas the encryption strategies have developed over time, the attribute array construction has remained constant as much as the time of writing.

Primarily based on Lumma Stealer’s inside pattern versioning, which is closely protected by stack string obfuscation, we all know that up till January 2025, the C&C domains within the samples had been protected by an XOR operate and base64 encoding (see Determine 4). When the base64-encoded string was decoded, it revealed a construction the place the primary 32 bytes served as an XOR key, and the remaining bytes contained the encrypted C&C area.

Figure 4. List of XOR-protected and base64-encoded C&C domains
Determine 4. Listing of XOR-protected and base64-encoded C&C domains

In January 2025, Lumma Stealer transitioned the safety of the C&C listing to ChaCha20 encryption with a single hardcoded key and nonce (see Determine 5). This safety of the C&C listing within the Lumma Stealer binaries has remained the identical up till the time of publication.

Figure 5. ChaCha20-protected C&C domains
Determine 5. ChaCha20-protected C&C domains

Lifeless-drop resolvers

Since June 2024, every Lumma Stealer construct got here with a brand new function for acquiring a backup C&C. If no C&C server from the static config responds to Lumma Stealer, then the backup C&C is extracted from a dummy Steam profile net web page appearing as a dead-drop resolver. The Steam profile URL is closely protected within the binary, the identical manner because the model string. The encrypted backup C&C URL is ready within the Steam profile title, as proven in Determine 6, and the safety is a straightforward Caesar cipher (ROT11).

Figure 6. Steam profile and Telegram channel used as dead-drop resolvers
Determine 6. Steam profile and Telegram channel used as dead-drop resolvers

In February 2025, Lumma Stealer obtained an replace that included a function for acquiring a brand new, main C&C URL from a Telegram channel dead-drop resolver. The C&C URL is extracted from the Telegram channel’s title area, and it’s protected by the identical algorithm as within the case of the Steam profile dead-drop resolver. The principle distinction within the utilization of the Telegram and Steam profile dead-drop resolvers is that the Telegram possibility is examined first, whereas the Steam profile is used as a final resort if profitable communication has not been established with beforehand obtained C&C servers (Determine 16).

Furthermore, we consider that the Telegram dead-drop resolver is out there for greater tier subscriptions. It’s because many samples would not have the Telegram URL set, and due to this fact the malware skips this technique.

Lumma Stealer identifier

Every Lumma Stealer pattern comprises a singular hardcoded affiliate identifier generally known as LID. It’s embedded in plaintext type and utilized for communication with C&C servers. Up till March 2025, the LID parameter string adopted a structured format, delimited by two dashes (Determine 7). A detailed evaluation of the LID affiliate string is supplied in an upcoming part.

Figure 7. LID identifier in LummaStealer sample
Determine 7. LID identifier in Lumma Stealer pattern

Though probably the most prevalent LID noticed throughout our monitoring begins with the string uz4s1o; the second most typical LID, which begins with LPnhqo, offers a greater instance for visualizing typical LID variability. Within the phrase cloud in Determine 8, we current the highest 200 LIDs collected throughout our monitoring, beginning with LPnhqo.

Figure 8. List of the top 200 LID identifiers beginning with the LPnhqo prefix seen in our telemetry
Determine 8. Listing of the highest 200 LID identifiers starting with the LPnhqo prefix seen in our telemetry

Nevertheless, in early March 2025, Lumma Stealer transitioned to utilizing hexadecimal identifiers, referred to internally as UID (see Determine 9).

Figure 9. Dynamic configuration HTTPS POST request comparison
Determine 9. Comparability of HTTPS POST requests for a dynamic configuration

Elective configuration identifier

Along with the LID parameter, Lumma Stealer samples can also include an non-compulsory parameter referred to internally as J. When current, this parameter is in cleartext and formatted as a 32-byte ASCII hex string (see Determine 10). The J parameter is utilized within the C&C request for dynamic configuration with further definitions for exfiltration. We discuss dynamic configuration in additional element in a following part.

Figure 10. J parameter in the LummaStealer sample
Determine 10. The J parameter in a Lumma Stealer pattern

If the J parameter is lacking within the Lumma Stealer pattern, an empty string is used within the C&C request and a default configuration is retrieved. Not like LID, the J parameter is never current in Lumma Stealer samples. Nevertheless, it performs an important position when current, because it permits retrieving a dynamic configuration that considerably will increase the stealer’s capabilities, making it a extra versatile exfiltration instrument for risk actors.

In March 2025, when the LID parameter was renamed to UID and its format modified, the J parameter was renamed to CID however with no change to its format or operate.

Evaluation of static properties

From our long-term monitoring and statistical evaluation of LID parameters, we consider that the primary section of the LID identifies the affiliate, whereas the second section differentiates between campaigns. Primarily based on this assumption you may see the highest 200 affiliate identifiers in Determine 11.

Figure 11. The most frequently seen affiliate identifiers in our telemetry
Determine 11. Probably the most regularly seen affiliate identifiers in our telemetry

Furthermore, we’ve been capable of create a visualization of the associates’ actions over the previous 12 months (see Determine 12). This visualization highlights every week in January 2025. A majority of these visualizations have supplied us with worthwhile insights into the patterns and behaviors of various risk actors. Moreover, the visualizations reveal a shared, domain-based C&C infrastructure amongst most Lumma Stealer associates. On the identical time, we had been capable of determine much less regularly used C&C domains, which we suspect have been reserved for greater tier associates or extra necessary campaigns.

Figure 12. Visualization of LummaStealer infrastructure utilization (early January 2025 time frame)
Determine 12. Visualization of Lumma Stealer infrastructure utilization (early January 2025 timeframe)

Dynamic properties of Lumma Stealer

Lumma Stealer retrieves a dynamic configuration from the C&C server, which comprises definitions specifying what to scan for exfiltration (see Desk 1). The first focus is on stealing net browser extension knowledge and databases containing passwords, session cookies, net shopping historical past, and autofill knowledge. Moreover net browsers, it additionally focuses on stealing knowledge from password managers, VPNs, FTP purchasers, cloud companies, distant desktop purposes, electronic mail purchasers, cryptocurrency wallets, and note-taking purposes.

Desk 1. Dynamic config’s JSON fields

KeyDescription
vDynamic config model.
sePossibility for taking a screenshot of the sufferer’s machine for exfiltration.
exListing of Chromium-based browser extensions to focus on for exfiltration.
Every entry consists of:
 ·  The extension ID, saved as en.
 ·  The extension title, saved as ez.
cDefinition of information focused for exfiltration.
Probably the most attention-grabbing entries are:
 ·  The trail for file scanning, saved as p.
 ·  The file extension listing filter for exfiltration, saved as m.
 ·  The utmost folder scanning depth, saved as d.
 ·  The utmost file dimension for exfiltration, saved as fs.

Despite the fact that we haven’t seen important adjustments within the default configurations, this function enhances the malware’s capability to carry out focused exfiltration (see Determine 13). A complete overview of the configuration fields has already been effectively documented on this analysis by SpyCloud.

Figure 13. Example of a dynamic config
Determine 13. Instance of a dynamic config

The configuration is in JSON format, and it’s downloaded from the C&C server utilizing an HTTPS POST request that features the LID identifier, non-compulsory J parameter, and a selected hardcoded Consumer-Agent string.

The safety of the dynamic configuration has modified a couple of instances not too long ago. Previously, it was protected in the identical manner because the static C&C listing, by a 32-byte XOR operate and base64 encoding. In March 2025 the safety modified to ChaCha20, the place the important thing and nonce had been prepended to the encrypted configuration.

The Consumer-Agent string is necessary to observe, as offering it accurately is crucial for receiving the dynamic configuration. In April 2025, Lumma Stealer launched an extra layer of obfuscation by encrypting JSON values utilizing an 8-byte XOR operate (see Determine 14).

Figure 14. Dynamic configuration with encryption of some values
Determine 14. Dynamic configuration with encryption of some values

This encrypted variant of the dynamic configuration is delivered when a barely up to date Consumer-Agent string is specified (see Desk 2).

Desk 2. Consumer-Agent variants

Consumer-AgentDescription
Mozilla/5.0 (Home windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Previous Consumer-Agent string leading to a dynamic configuration variant proven in Determine 13.
Mozilla/5.0 (Home windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36New Consumer-Agent string leading to a dynamic configuration variant with encryption of some values (Determine 14).

Moreover this dynamic configuration method, Lumma Stealer samples nonetheless include hardcoded directions for exfiltrating information. These embrace knowledge from purposes comparable to Outlook or Thunderbird, Steam account info, and Discord account tokens (see this SpyCloud blogpost). This mixture of dynamic and hardcoded configurations ensures that Lumma Stealer can successfully accumulate a variety of worthwhile knowledge.

To summarize all of the static and dynamic adjustments talked about thus far, we’ve created a timeline (Determine 15) highlighting probably the most important developments noticed within the Lumma Stealer malware over the previous 12 months.

Figure 15. Timeline of the most significant updates over the past year
Determine 15. Timeline of probably the most important updates over the previous 12 months

C&C communication

All through our Lumma Stealer monitoring interval, all extracted C&C domains persistently led to Cloudflare companies, that are utilized to hide Lumma Stealer’s actual C&C infrastructure. Cloudflare companies are additionally employed for C&C servers positioned through dead-drop resolvers.

First, Lumma Stealer must acquire an lively C&C server. The mechanism of this selection is illustrated within the movement chart proven in Determine 16.

Figure 16. C&C selection mechanism
Determine 16. C&C choice mechanism

Handshake

Though the precise handshake request to the C&C server will not be current within the newest Lumma Stealer builds, it’s price mentioning as a result of it was a function of our monitoring for a very long time. The handshake request was an HTTPS POST request containing act=stay and a hardcoded Consumer-Agent. Energetic servers responded with a cleartext okay message.

Configuration request

When Lumma Stealer identifies an lively C&C server, it requests the configuration through an HTTPS POST request (Determine 17), which incorporates the LID and J parameters as knowledge. If the J parameter will not be current within the pattern, Lumma Stealer retrieves the default configuration from the C&C server. This configuration specifies what to scan for exfiltration, permitting the malware to adapt to completely different targets and environments.

Extra payload execution

After Lumma Stealer efficiently exfiltrates delicate knowledge and harvested credentials, it points one ultimate HTTPS POST request to the C&C server – this time, with an extra sufferer {hardware} ID known as hwid. This ultimate request retrieves a configuration of an extra payload to be executed on the sufferer’s machine. The payload or a URL to obtain from is a part of that configuration. Be aware that such a payload will not be at all times supplied.

Figure 17. LummaStealer C&C communication flow
Determine 17. Lumma Stealer C&C communication movement

Anti-analysis obfuscation strategies

Lumma Stealer employs a couple of, however efficient, anti-emulation strategies to make evaluation as difficult as doable. These strategies are designed to evade detection and hinder the efforts of safety analysts.

Oblique bounce obfuscation

One of many main obfuscation strategies utilized by Lumma Stealer is oblique management movement flattening, proven in Determine 18. This technique successfully disrupts the code blocks of the features, making it practically not possible to maintain observe of the operate logic. By flattening the management movement, the malware obfuscates its operations, complicating the evaluation course of. For an in depth exploration of this method and thorough evaluation of those obfuscation patterns, together with an overview of the answer, you may check with this complete article by Mandiant.

Figure 18. Indirect control flow obfuscation
Determine 18. Oblique management movement obfuscation

Stack strings

One other approach employed by Lumma Stealer is using encrypted stack strings, as illustrated in Determine 19. This technique successfully hides binary knowledge and lots of necessary strings within the Lumma Stealer pattern, making static evaluation of the binary troublesome. Furthermore, every encrypted string has its personal distinctive mathematical operate for decryption, including one other layer of complexity to the evaluation course of.

Figure 19. Stack string decryption routine
Determine 19. Stack string decryption routine

Import API obfuscation

In Lumma Stealer, imports are resolved at runtime. Import names are hashed utilizing the FNV-1a algorithm with every construct utilizing a customized offset foundation. As proven in Determine 20, since August 25th, 2024, Lumma Stealer additionally obfuscates the FNV hash algorithm parameters by utilizing stack strings.

Figure 20. Import API hash algorithm parameter obfuscation
Determine 20. Stack string obfuscation of hash parameters used for obfuscating imported API names

Conclusion

This world disruption operation was made doable by our long-term monitoring of Lumma Stealer, which we’ve supplied an outline of on this blogpost. We’ve described the modus operandi of the Lumma Stealer group and its service. Moreover, we’ve documented the necessary static identifiers and C&C communication in addition to its evolution over the past 12 months. Lastly, we summarized the important thing obfuscation strategies that make the evaluation of Lumma Stealer difficult.

The disruption operation, led by Microsoft, goals to grab all identified Lumma Stealer C&C domains, rendering Lumma Stealer’s exfiltration infrastructure nonfunctional. ESET will proceed to trace different infostealers whereas intently monitoring for Lumma Stealer exercise following this disruption operation.

For any inquiries about our analysis revealed on WeLiveSecurity, please contact us at threatintel@eset.com
ESET Analysis gives non-public APT intelligence reviews and knowledge feeds. For any inquiries about this service, go to the ESET Risk Intelligence web page.

IoCs

SHA-1FilenameDetectionDescription
6F94CFAABB19491F2B8E719D74AD032D4BEB3F29AcroRd32.exeWin32/Spy.Lumma Stealer.BLumma Stealer pattern – Construct 2024-06-27.
C5D3278284666863D7587F1B31B06F407C592AC4Notion.exeWin32/Spy.Lumma Stealer.BLumma Stealer pattern – Construct 2024-07-14.
5FA1EDC42ABB42D54D98FEE0D282DA453E200E99explorer.exeWin32/Spy.Lumma Stealer.BLumma Stealer pattern – Construct 2024-08-08.
0D744811CF41606DEB41596119EC7615FFEB0355aspnet_regiis.exeWin32/Spy.Lumma Stealer.BLumma Stealer pattern – Construct 2024-08-25.
2E3D4C2A7C68DE2DD31A8E0043D9CF7E7E20FDE1nslookup.exeWin32/Spy.Lumma Stealer.BLumma Stealer pattern – Construct 2024-09-20.
09734D99A278B3CF59FE82E96EE3019067AF2AC5nslookup.exeWin32/Spy.Lumma Stealer.BLumma Stealer pattern – Construct 2024-10-04.
1435D389C72A5855A5D6655D6299B4D7E78A0127BitLockerToGo.exeWin32/Spy.Lumma Stealer.BLumma Stealer pattern – Construct 2024-11-09.
2CCCEA9E1990D6BC7755CE5C3B9B0E4C9A8F0B59exterior.exeWin32/Spy.Lumma Stealer.BLumma Stealer pattern – Construct 2024-12-23.
658550E697D9499DB7821CBBBF59FFD39EB59053Wemod-Premium-Unlocker-2025MSIL/GenKryptik.HGWULumma Stealer pattern – Construct 2025-01-18.
070A001AC12139CC1238017D795A2B43AC52770DkhykuQw.exeWin32/Kryptik.HYUCLumma Stealer pattern – Construct 2025-02-27.
1FD806B1A0425340704F435CBF916B748801A387Begin.exeWin64/Injector.WRLumma Stealer pattern – Construct 2025-03-24.
F4840C887CAAFF0D5E073600AEC7C96099E32030loader.exeWin64/Kryptik.FAZLumma Stealer pattern – Construct 2025-04-15.
8F58C4A16717176DFE3CD531C7E41BEF8CDF6CFESet-up.exeWin32/Spy.Lumma Stealer.BLumma Stealer pattern – Construct 2025-04-23.

Community

IPAreaInternet hosting supplierFirst seenParticulars
172.67.134[.]100cooperatvassquaidmew[.]xyzCloudflare, Inc.2024‑06‑27Lumma Stealer C&C server.
172.67.175[.]165crisisrottenyjs[.]xyzCloudflare, Inc.2024‑06‑27Lumma Stealer C&C server.
188.114.96[.]1deadtrainingactioniw[.]xyz
tamedgeesy[.]sbs
nighetwhisper[.]prime
Cloudflare, Inc.2024‑06‑27Lumma Stealer C&C server.
172.67.141[.]43exuberanttjdkwo[.]xyzCloudflare, Inc.2024‑06‑27Lumma Stealer C&C server.
188.114.96[.]3grandcommonyktsju[.]xyzCloudflare, Inc.2024‑06‑27Lumma Stealer C&C server.
104.21.92[.]96qualificationjdwko[.]xyzCloudflare, Inc.2024‑06‑27Lumma Stealer C&C server.
172.67.209[.]200sweetcalcutangkdow[.]xyzCloudflare, Inc.2024‑06‑27Lumma Stealer C&C server.
104.21.49[.]80wordingnatturedowo[.]xyzCloudflare, Inc.2024‑06‑27Lumma Stealer C&C server.
188.114.97[.]0bigmouthudiop[.]store
froytnewqowv[.]store
locatedblsoqp[.]store
stagedchheiqwo[.]store
Cloudflare, Inc.2024‑07‑16Lumma Stealer C&C server.
104.21.19[.]156callosallsaospz[.]storeCloudflare, Inc.2024‑07‑18Lumma Stealer C&C server.
172.67.153[.]40indexterityszcoxp[.]storeCloudflare, Inc.2024‑07‑18Lumma Stealer C&C server.
172.67.192[.]52lariatedzugspd[.]storeCloudflare, Inc.2024‑07‑18Lumma Stealer C&C server.
172.67.213[.]85liernessfornicsa[.]storeCloudflare, Inc.2024‑07‑18Lumma Stealer C&C server.
172.67.137[.]78outpointsozp[.]storeCloudflare, Inc.2024‑07‑18Lumma Stealer C&C server.
172.67.221[.]214shepherdlyopzc[.]storeCloudflare, Inc.2024‑07‑18Lumma Stealer C&C server.
172.67.204[.]158unseaffarignsk[.]storeCloudflare, Inc.2024‑07‑18Lumma Stealer C&C server.
172.67.178[.]194upknittsoappz[.]storeCloudflare, Inc.2024‑07‑18Lumma Stealer C&C server.
188.114.97[.]3bassizcellskz[.]store
byteplusx[.]digital
sparkiob[.]digital
longitudde[.]digital
Cloudflare, Inc.2024‑08‑07Lumma Stealer C&C server.
104.21.47[.]141celebratioopz[.]storeCloudflare, Inc.2024‑08‑07Lumma Stealer C&C server.
172.67.158[.]159complaintsipzzx[.]storeCloudflare, Inc.2024‑08‑07Lumma Stealer C&C server.
172.67.204[.]20deallerospfosu[.]storeCloudflare, Inc.2024‑08‑07Lumma Stealer C&C server.
104.21.35[.]48languagedscie[.]storeCloudflare, Inc.2024‑08‑07Lumma Stealer C&C server.
104.21.73[.]43mennyudosirso[.]storeCloudflare, Inc.2024‑08‑07Lumma Stealer C&C server.
188.114.97[.]9quialitsuzoxm[.]storeCloudflare, Inc.2024‑08‑07Lumma Stealer C&C server.
172.67.166[.]231writerospzm[.]storeCloudflare, Inc.2024‑08‑07Lumma Stealer C&C server.
104.21.16[.]180caffegclasiqwp[.]storeCloudflare, Inc.2024‑08‑24Lumma Stealer C&C server.
172.67.146[.]35condedqpwqm[.]storeCloudflare, Inc.2024‑08‑24Lumma Stealer C&C server.
N/Aevoliutwoqm[.]storeN/A2024‑08‑24Lumma Stealer C&C server.
188.114.96[.]0millyscroqwp[.]store
stamppreewntnq[.]store
advennture[.]prime
Cloudflare, Inc.2024‑08‑24Lumma Stealer C&C server.
104.21.67[.]155traineiwnqo[.]storeCloudflare, Inc.2024‑08‑24Lumma Stealer C&C server.
94.140.14[.]33achievenmtynwjq[.]store
carrtychaintnyw[.]store
chickerkuso[.]store
metallygaricwo[.]store
milldymarskwom[.]store
opponnentduei[.]store
puredoffustow[.]store
quotamkdsdqo[.]store
bemuzzeki[.]sbs
exemplarou[.]sbs
exilepolsiy[.]sbs
frizzettei[.]sbs
invinjurhey[.]sbs
isoplethui[.]sbs
laddyirekyi[.]sbs
wickedneatr[.]sbs
Cloudflare, Inc.2024‑09‑21Lumma Stealer C&C server.
188.114.97[.]4usseorganizedw[.]store
bellflamre[.]click on
tripfflux[.]world
Cloudflare, Inc.2024‑09‑24Lumma Stealer C&C server.
104.21.44[.]84beerishint[.]sbsCloudflare, Inc.2024‑10‑06Lumma Stealer C&C server.
104.21.64[.]841212tank.activitydmy[.]icuCloudflare, Inc.2024‑11‑12Lumma Stealer C&C server.
104.21.93[.]246brownieyuz[.]sbsCloudflare, Inc.2024‑11‑08Lumma Stealer C&C server.
172.67.189[.]210ducksringjk[.]sbsCloudflare, Inc.2024‑11‑08Lumma Stealer C&C server.
172.67.146[.]64explainvees[.]sbsCloudflare, Inc.2024‑11‑08Lumma Stealer C&C server.
104.21.90[.]226relalingj[.]sbsCloudflare, Inc.2024‑11‑08Lumma Stealer C&C server.
104.21.14[.]17repostebhu[.]sbsCloudflare, Inc.2024‑11‑08Lumma Stealer C&C server.
172.67.192[.]43rottieud[.]sbsCloudflare, Inc.2024‑11‑08Lumma Stealer C&C server.
188.114.97[.]1thinkyyokej[.]sbsCloudflare, Inc.2024‑11‑08Lumma Stealer C&C server.
188.114.97[.]7bashfulacid[.]lat
tentabatte[.]lat
Cloudflare, Inc.2024‑12‑23Lumma Stealer C&C server.
104.21.86[.]54curverpluch[.]latCloudflare, Inc.2024‑12‑23Lumma Stealer C&C server.
104.21.66[.]86lev‑tolstoi[.]comCloudflare, Inc.2024‑12‑17Lumma Stealer C&C server.
172.64.80[.]1manyrestro[.]lat
toppyneedus[.]biz
Cloudflare, Inc.2024‑12‑23Lumma Stealer C&C server.
188.114.97[.]2shapestickyr[.]latCloudflare, Inc.2024‑12‑23Lumma Stealer C&C server.
172.67.192[.]247slipperyloo[.]latCloudflare, Inc.2024‑12‑23Lumma Stealer C&C server.
104.105.90[.]131steamcommunity[.]com
steamcommunity[.]com
Akamai Applied sciences, Inc.2024‑06‑27Steam profile lifeless‑drop resolvers.
172.67.146[.]68talkynicer[.]latCloudflare, Inc.2024‑12‑23Lumma Stealer C&C server.
172.67.184[.]241wordyfindy[.]latCloudflare, Inc.2024‑12‑23Lumma Stealer C&C server.
N/Abeevasyeip[.]bondN/A2025‑01‑22Lumma Stealer C&C server.
N/Abroadecatez[.]bondN/A2025‑01‑22Lumma Stealer C&C server.
N/Aencirelk[.]cyouN/A2025‑01‑28Lumma Stealer C&C server.
N/Agranystearr[.]bondN/A2025‑01‑22Lumma Stealer C&C server.
N/Aquarrelepek[.]bondN/A2025‑01‑22Lumma Stealer C&C server.
N/Arockemineu[.]bondN/A2025‑01‑28Lumma Stealer C&C server.
104.21.19[.]91suggestyuoz[.]bizCloudflare, Inc.2025‑01‑22Lumma Stealer C&C server.
N/Atranuqlekper[.]bondN/A2025‑01‑22Lumma Stealer C&C server.
104.21.69[.]194codxefusion[.]primeCloudflare, Inc.2025‑02‑28Lumma Stealer C&C server.
104.21.80[.]1earthsymphzony[.]right this moment
climatologfy[.]prime
Cloudflare, Inc.2025‑02‑26Lumma Stealer C&C server.
104.21.88[.]16experimentalideas[.]right this momentCloudflare, Inc.2025‑03‑01Lumma Stealer C&C server.
172.67.146[.]181gadgethgfub[.]icuCloudflare, Inc.2025‑03‑01Lumma Stealer C&C server.
104.21.48[.]238hardrwarehaven[.]runCloudflare, Inc.2025‑02‑28Lumma Stealer C&C server.
104.21.16[.]1hardswarehub[.]right this moment
pixtreev[.]run
Cloudflare, Inc.2025‑02‑28Lumma Stealer C&C server.
104.21.39[.]95quietswtreams[.]lifeCloudflare, Inc.2025‑02‑26Lumma Stealer C&C server.
172.67.222[.]46socialsscesforum[.]icuCloudflare, Inc.2025‑03‑03Lumma Stealer C&C server.
172.67.191[.]187techmindzs[.]stayCloudflare, Inc.2025‑03‑01Lumma Stealer C&C server.
172.67.214[.]226techspherxe[.]primeCloudflare, Inc.2025‑03‑01Lumma Stealer C&C server.
104.21.26[.]124appgridn[.]stayCloudflare, Inc.2025‑03‑24Lumma Stealer C&C server.
172.67.178[.]7lunoxorn[.]primeCloudflare, Inc.2025‑03‑31Lumma Stealer C&C server.
104.21.47[.]117skynetxc[.]stayCloudflare, Inc.2025‑03‑24Lumma Stealer C&C server.
104.21.72[.]121targett[.]primeCloudflare, Inc.2025‑03‑20Lumma Stealer C&C server.
188.114.96[.]2travewlio[.]storeCloudflare, Inc.2025‑03‑20Lumma Stealer C&C server.
104.21.42[.]7changeaie[.]primeCloudflare, Inc.2025‑04‑08Lumma Stealer C&C server.
104.21.85[.]126clarmodq[.]primeCloudflare, Inc.2025‑04‑08Lumma Stealer C&C server.
172.67.161[.]40liftally[.]primeCloudflare, Inc.2025‑04‑08Lumma Stealer C&C server.
172.67.176[.]107piratetwrath[.]runCloudflare, Inc.2025‑04‑17Lumma Stealer C&C server.
172.67.215[.]114quilltayle[.]stayCloudflare, Inc.2025‑04‑17Lumma Stealer C&C server.
172.67.143[.]12salaccgfa[.]primeCloudflare, Inc.2025‑04‑08Lumma Stealer C&C server.
104.21.5[.]146starofliught[.]primeCloudflare, Inc.2025‑04‑17Lumma Stealer C&C server.
104.21.32[.]1zestmodp[.]primeCloudflare, Inc.2025‑04‑08Lumma Stealer C&C server.
172.67.147[.]123equatorf[.]runCloudflare, Inc.2025‑04‑21Lumma Stealer C&C server.
104.21.112[.]1hemispherexz[.]primeCloudflare, Inc.2025‑04‑21Lumma Stealer C&C server.
104.21.20[.]106latitudert[.]stayCloudflare, Inc.2025‑04‑21Lumma Stealer C&C server.
172.67.216[.]12sectorecoo[.]stayCloudflare, Inc.2025‑04‑19Lumma Stealer C&C server.

MITRE ATT&CK strategies

This desk was constructed utilizing model 17 of the MITRE ATT&CK framework.

TacticIDTitleDescription
Useful resource ImprovementT1587.001Develop Capabilities: MalwareLumma Stealer operators actively developed their malware as a product for his or her service.
T1583.001Purchase Infrastructure: DomainsLumma Stealer operators registered domains for his or her exfiltration infrastructure.
T1583.006Purchase Infrastructure: Net ProvidersLumma Stealer operators used Cloudflare companies to cover their infrastructure. Lumma Stealer additionally hid its C&C URLs in public companies like dummy Steam profiles or empty Telegram channels.
ExecutionT1059.003Command-Line Interface: Home windows Command ShellLumma Stealer executes cmd.exe to delete short-term information.
T1106Native APILumma Stealer executes a wide range of Home windows APIs, together with VirtualAlloc, LoadLibraryA, and GetProcAddress.
T1204.001Consumer Execution: Malicious HyperlinkLumma Stealer operators supply a easy LNK packing function for his or her malware builds.
T1047Home windows Administration InstrumentationLumma Stealer makes use of WMI queries to collect system info.
Protection EvasionT1622Debugger EvasionLumma Stealer checks for debugger presence.
T1140Deobfuscate/Decode Recordsdata or InfoLumma Stealer makes use of ChaCha20 for C&C listing and dynamic config encryption.
T1027.007Obfuscated Recordsdata or Info: Dynamic API DecisionLumma Stealer resolves API names at runtime utilizing the FNV-1a hash algorithm.
T1027.013Obfuscated Recordsdata or Info: Encrypted/Encoded FileLumma Stealer encrypts strings and necessary binary knowledge utilizing stack strings or ChaCha20.
Credential EntryT1555.003Credentials from Password Shops: Credentials from Net BrowsersLumma Stealer gathers credentials from a number of browsers.
T1539Steal Net Session CookieLumma Stealer gathers cookies from a number of browsers.
DiscoveryT1217Browser Bookmark DiscoveryLumma Stealer checks and collects varied details about put in browsers on victims’ machines.
T1012Question RegistryLumma Stealer queries registry keys to listing put in software program on victims’ machines.
T1057Course of DiscoveryLumma Stealer sends the method listing to its C&C server.
T1518Software program DiscoveryLumma Stealer sends an inventory of put in software program to its C&C server.
T1082System Info DiscoveryLumma Stealer sends system info to its C&C server.
T1124System Time DiscoveryLumma Stealer sends the present system time and time zone to its C&C server.
AssortmentT1560Archive Collected InformationLumma Stealer compresses gathered knowledge earlier than exfiltration to its C&C server.
T1119Automated AssortmentLumma Stealer’s exfiltration capabilities are totally automated and primarily based on a configuration file.
T1113Display SeizeLumma Stealer takes screenshots of victims’ machines primarily based on dynamic configuration.
T1005Information from Native SystemLumma Stealer collects native system knowledge from victims’ machines.
Command and ManagementT1071.001Utility Layer Protocol: Net ProtocolsLumma Stealer makes use of HTTPS communication with its C&C servers.
T1132.001Information Encoding: Commonplace EncodingLumma Stealer used base64 encoding for acquiring its configuration from the C&C server.
T1573.001Encrypted Channel: Symmetric CryptographyLumma Stealer makes use of further ChaCha20 encryption beneath the HTTPS community protocol.
T1008Fallback ChannelsLumma Stealer employs backup dead-drop resolvers in Steam profiles and Telegram channels.
T1102.001Net Service: Lifeless Drop ResolverLumma Stealer employs backup dead-drop resolvers in Steam profiles and Telegram channels.
ExfiltrationT1020Automated ExfiltrationLumma Stealer exfiltrates stolen credentials and knowledge over the C&C channel.
T1041Exfiltration Over C2 ChannelLumma Stealer exfiltrates stolen credentials and knowledge over the C&C channel.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles