

AsyncRAT – Active IOCs
April 15, 2025
Multiple Zoom Products Vulnerabilities
April 15, 2025
AsyncRAT – Active IOCs
April 15, 2025
Multiple Zoom Products Vulnerabilities
April 15, 2025Severity
Medium
Analysis Summary
Lumma is an information stealer that is sold as a Malware-as-a-Service (MaaS) on Russian-speaking underground forums and Telegram. Lumma is an information stealer, which means its primary purpose is to steal sensitive data from infected systems. Lumma is written in the C programming language, which allows for efficient and low-level access to system resources. It is distributed as a service by LummaC, the seller, on Russian-speaking underground forums and Telegram channels. Lumma places a particular emphasis on stealing cryptocurrency wallets. This indicates that the malware is designed to target and extract sensitive information related to cryptocurrency, such as private keys or wallet.dat files. In addition to its focus on cryptocurrency wallets, Lumma also possesses file-grabber capabilities.
To protect against Lumma Stealer and similar threats, it is essential to follow security best practices. This includes regularly updating software and operating systems, using strong and unique passwords, implementing multi-factor authentication, exercising caution when opening email attachments or clicking on suspicious links, and using reputable antivirus/anti-malware solutions. Security awareness training can also help users recognize and avoid phishing attempts.
Impact
- Data Exfiltration
- Credential Theft
- Information Theft
- Financial Loss
Indicators of Compromise
MD5
dfd189ea3a99f8f795a1e193d27e314f
d5e6b76729a990dbdcfc3585f509f9ab
9d2939cffe5359190822152c66d542f1
SHA-256
6dbd58963cf0c5b363903c8670832c3287fb0d350df5a213e9acad16a448900b
f26fa97df6a11b497b0c9089009eb71047cbed986059e6392166bd662424c2e9
e4d5987fbd6e3f60071b857ca44f2e5dfa9c1196d7a4ea6035f18655eece3039
SHA1
b9bfbbd74d751221bc23fc0517ac4e63c34335d2
8789b2f6d96a79edfd4e36e9562576bd9844000f
b05f17df088936f728cba68fe58748f4b5504293
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Emails from unknown senders should always be treated with caution. Never trust or open links and attachments received from unknown sources/senders.
- Maintain cyber hygiene by updating your anti-virus software and implementing a patch management lifecycle.
- Patch and upgrade any platforms and software timely and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.
- Enable antivirus and anti-malware software and update signature definitions on time. Using multi-layered protection is necessary to secure vulnerable assets.