Rewterz
Fake Google Ads Used in Malvertising Scam to Hijack Microsoft Advertising Accounts – Active IOCs
February 2, 2025
Rewterz
Mirai Botnet aka Katana – Active IOCs
February 3, 2025

Lumma Stealer Malware aka LummaC – Active IOCs

Severity

Medium

Analysis Summary

Lumma is an information stealer that is sold as a Malware-as-a-Service (MaaS) on Russian-speaking underground forums and Telegram. Lumma is an information stealer, which means its primary purpose is to steal sensitive data from infected systems. Lumma is written in the C programming language, which allows for efficient and low-level access to system resources. It is distributed as a service by LummaC, the seller, on Russian-speaking underground forums and Telegram channels. Lumma places a particular emphasis on stealing cryptocurrency wallets. This indicates that the malware is designed to target and extract sensitive information related to cryptocurrency, such as private keys or wallet.dat files. In addition to its focus on cryptocurrency wallets, Lumma also possesses file-grabber capabilities.

To protect against Lumma Stealer and similar threats, it is essential to follow security best practices. This includes regularly updating software and operating systems, using strong and unique passwords, implementing multi-factor authentication, exercising caution when opening email attachments or clicking on suspicious links, and using reputable antivirus/anti-malware solutions. Security awareness training can also help users recognize and avoid phishing attempts.

Impact

  • Data Exfiltration
  • Credential Theft
  • Information Theft
  • Financial Loss

Indicators of Compromise

MD5

  • a26658b12eec0615011bdde9c3fdad94

  • 7b3e707a6a9aebe2ee1c787797b3453f

  • 8f8b6c54e6abc14ae75a4416ecadad0d

SHA-256

  • bd70ed9867923cb6c248e582981563631e3ca3edc73813a961f4a1feb79a6b03

  • a370b743e1f1ecc8fb98e68c6f0ef9d4c1744914846cb7363063a4662f869362

  • b07c350afe713240c8697068b0a1bc43b24cb7882f3716dc06c67bb0fb5addad

SHA1

  • 3267d7f8f2d26c596285afb90e4aa2329be3f46f

  • a2c22bea396643b85be71236753697128a7aff8b

  • 096dac0e98112e153fa1aa8a38b3c47ad06efbf9

Remediation

  • Block all threat indicators at your respective controls.
  • Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
  • Emails from unknown senders should always be treated with caution. Never trust or open links and attachments received from unknown sources/senders.
  • Maintain cyber hygiene by updating your anti-virus software and implementing a patch management lifecycle.
  • Patch and upgrade any platforms and software timely and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.
  • Enable antivirus and anti-malware software and update signature definitions on time. Using multi-layered protection is necessary to secure vulnerable assets.