

LokiBot Malware – Active IOCs
January 24, 2025
Multiple Oracle Products Vulnerabilities
January 24, 2025
LokiBot Malware – Active IOCs
January 24, 2025
Multiple Oracle Products Vulnerabilities
January 24, 2025Severity
Medium
Analysis Summary
Lumma is an information stealer that is sold as a Malware-as-a-Service (MaaS) on Russian-speaking underground forums and Telegram. Lumma is an information stealer, which means its primary purpose is to steal sensitive data from infected systems. Lumma is written in the C programming language, which allows for efficient and low-level access to system resources. It is distributed as a service by LummaC, the seller, on Russian-speaking underground forums and Telegram channels. Lumma places a particular emphasis on stealing cryptocurrency wallets. This indicates that the malware is designed to target and extract sensitive information related to cryptocurrency, such as private keys or wallet.dat files. In addition to its focus on cryptocurrency wallets, Lumma also possesses file-grabber capabilities.
To protect against Lumma Stealer and similar threats, it is essential to follow security best practices. This includes regularly updating software and operating systems, using strong and unique passwords, implementing multi-factor authentication, exercising caution when opening email attachments or clicking on suspicious links, and using reputable antivirus/anti-malware solutions. Security awareness training can also help users recognize and avoid phishing attempts.
Impact
- Data Exfiltration
- Credential Theft
- Information Theft
- Financial Loss
Indicators of Compromise
MD5
a76832780d821ddfac79d54a9680731d
5909eea891084039817fbbc8e97d492c
eb48183db7bfa4e99a519f37ee0f88ac
SHA-256
f056a5a3cad947c8c7e77047228db5b89c8c5f4faf7fec296abbda167db23234
c538e0f1afae206bdb62080a127297887a67773dc0fac44dfad30b6aa9676a65
eab7ba0ee6ec5659e461fbe4d9dadb9103a2c277ad572f869a8473b698944025
SHA1
238e094e847153732b95ad416e361473a1eac527
f22678506f33a89cd65ae1bcc1bfb87ef27d7b6b
8d081a7878c86767a156dea471f638ff8ac2c0a9
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Emails from unknown senders should always be treated with caution. Never trust or open links and attachments received from unknown sources/senders.
- Maintain cyber hygiene by updating your anti-virus software and implementing a patch management lifecycle.
- Patch and upgrade any platforms and software timely and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.
- Enable antivirus and anti-malware software and update signature definitions on time. Using multi-layered protection is necessary to secure vulnerable assets.