Lumma Stealer, coming and going

Lumma Stealer, coming and going
In late 2024, Sophos uncovered a Lumma Stealer campaign abusing fake CAPTCHA sites to trick victims into running malicious PowerShell commands, delivering an info-stealing payload that siphons credentials and crypto wallets. The malware uses obfuscation and multi-stage downloads to evade detection. (Affected: Windows users, cybersecurity sector)

Keypoints :

  • Lumma Stealer is an info-stealer active since mid-2022, offered as Malware-as-a-Service via Telegram.
  • The stealer targets passwords, session tokens, crypto wallets, and personal data from compromised Windows devices.
  • Attackers use fake CAPTCHA websites to trick users into pasting malicious PowerShell commands into Windows Run dialog.
  • PowerShell scripts download and execute the Lumma Stealer payload from remote servers hosted on Cloud services.
  • Payload includes obfuscated AutoIt scripts that steal browser credentials and exfiltrate data via C2 servers.
  • Alternate delivery uses disguised shortcut (.lnk) files that launch obfuscated PowerShell commands via OpenSSH utilities.
  • Payload uses AES encryption and dynamic .NET assembly loading to evade detection and perform runtime downloads.
  • The malware downloads and executes multiple payload stages, ending with exfiltration of stolen credentials.
  • Detection queries leveraging endpoint telemetry can help identify suspicious files, processes, and network activity.
  • User education to distrust CAPTCHAs and use of robust endpoint detection can mitigate Lumma Stealer risks.

MITRE Techniques :

  • Spearphishing via Service (T1194) – Using fake CAPTCHA sites to lure victims to execute malicious commands.
  • User Execution (T1204) – Victims manually paste PowerShell commands and execute disguised shortcut files.
  • PowerShell (T1059.001) – Malicious PowerShell scripts are used extensively to download and execute payloads.
  • Obfuscated Files or Information (T1027) – Payload and scripts use obfuscation, base64 encoding, and AES encryption.
  • Deobfuscate/Decode Files or Information (T1140) – Script decoding to reveal embedded PE files and further payloads.
  • Command and Scripting Interpreter (T1059) – Leveraging Windows Command Line and PowerShell for execution.
  • File and Directory Discovery (T1083) – Scripts access user directories like %AppData% and %temp% to place malicious files.
  • Exfiltration Over Command and Control Channel (T1041) – Stolen browser cookies and credentials exfiltrated to C2 servers.
  • Masquerading (T1036) – The payload is named ‘ArtistSponsorship.exe’ and shortcut files masquerade as PDFs.
  • Process Injection (T1055) – Loading the malicious PE dynamically into memory via .NET Assembly ‘Load’ method.

Indicator of Compromise :

  • The article mentions multiple malicious domains used as command-and-control servers such as snail-r1ced[.]cyou and fixedzip[.]oss-ap-southeast-5[.]aliyuncs[.]com.
  • There are SHA256 hashes of payload files including ArtistSponsorship.exe (sha256:e298cd6c5fe7b9b05a28480fd215ddcbd7aaa48a) and an obfuscated AutoIt script (sha256:05d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7).
  • Indicators also include IP addresses like 104.21.84[.]251 associated with C2 infrastructure.
  • File paths such as %AppData%, %temp%, and specific filenames like ‘i1040gi.pdf’ and ‘ArtistSponsorship.exe’ are noted as infection artifacts.
  • Script behaviors including PowerShell command lines downloading scripts from URLs and suspicious execution of mshta.exe and sftp.exe proxies are observable IOCs.

Read more: https://news.sophos.com/en-us/2025/05/09/lumma-stealer-coming-and-going/

Views: 23