

Lumma Stealer Malware aka LummaC – Active IOCs
November 7, 2025
Multiple Google Chrome Vulnerabilities
November 7, 2025
Lumma Stealer Malware aka LummaC – Active IOCs
November 7, 2025
Multiple Google Chrome Vulnerabilities
November 7, 2025Severity
High
Analysis Summary
DarkTortilla is a highly obfuscated, .NET-based malware crypter active since at least 2015. It is primarily linked to the financially motivated threat group GOLD CAMOUFLAGE, which operates DarkTortilla as a malware distribution service. Designed to deliver a wide range of payloads, it is frequently used to deploy info-stealers (AgentTesla, RedLine, NanoCore, AsyncRAT) and sometimes advanced tools like Cobalt Strike.
Known by aliases like "win.darktortilla", this malware features strong anti-analysis and evasion techniques, including process injection and in-memory execution to avoid detection. Its modular design allows for high configurability, enabling threat actors to adjust payloads, persistence methods, and communication protocols.
Recent campaigns show DarkTortilla masquerading as legitimate installers from brands like Grammarly and Cisco, distributed through phishing websites. Victims are lured into downloading malicious files, which then deploy the crypter to establish persistence, contact command-and-control (C2) servers, and deliver secondary payloads for data theft and espionage.
DarkTortilla has been used in targeted attacks in Kazakhstan, where it was coupled with AgentTesla to steal personal data. Its flexibility has made it a tool of choice for attacks across government, finance, critical infrastructure, and individual users, particularly in Central Asia, but its impact is global.
In summary, DarkTortilla serves as a powerful delivery mechanism for cybercriminals, offering stealth, adaptability, and effectiveness in a wide range of malware campaigns.
Impact
- Data Theft
- Cyber Espionage
Indicators of Compromise
MD5
- 5d111baa0e77c02c77cb240dfb546497
- 3fe800da8c684a5e50b2824c56b61306
- 66e2ba6f6c0cf9b359cf1576e082759d
- 4abe3ed8c1acd5db860261e831bdc4be
- 441663452ddafc8951f9ba7d1c428d28
SHA-256
- bf405d5470cb9900f08371031043f5c7c7a790fbc2af3b7d1fe43f9dbca1b705
- 223850176955ed89a903fa81454768fa0fd69df46f9456ece918058417ffd217
- 36c38c62e9276d44558f77044e996522eaf2b1c3f0e9783c1d0024ff98ff47ba
- 6e4854a0a4a965d1ecb59cd4e664b6c5452e00873134bb32a3ef96333738b951
- 2f18faa567de85a9af071bb6b52c9497d412f50179e0796e2cd8f4f4ecb098f2
SHA1
- 68cb0382fd73f351f752c785fad2990b96bb437f
- e3803a332031773d14b83ecae00533ee1e467e73
- a45340462cba807a96de3d02c1f761c1fc12f0d4
- c00078fd1ff92606293d025fbb165a7d6644c5c7
- 0f7b4ea962fe19d93151ec5f7fa5fb1109837dea
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Upgrade your operating system.
- Don't open files and links from unknown sources.
- Install and run anti-virus scans.








