{"id":204698,"date":"2024-11-20T20:46:51","date_gmt":"2024-11-21T04:46:51","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=204698"},"modified":"2024-11-20T20:46:51","modified_gmt":"2024-11-21T04:46:51","slug":"lumma-stealer-on-the-rise-how-telegram-channels-are-fueling-malware-proliferation","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lumma-stealer-on-the-rise-how-telegram-channels-are-fueling-malware-proliferation\/","title":{"rendered":"Lumma Stealer on the Rise: How Telegram Channels Are Fueling Malware Proliferation"},"content":{"rendered":"<p><em>Authored by: M.<\/em><\/p>\n<p><em>Authored by: M, Mohanasundaram and Neil Tyagi<\/em><\/p>\n<p style=\"font-weight: 400;\">In today\u2019s rapidly evolving cyber landscape, malware threats continue to adapt, employing new tactics and leveraging popular platforms to reach unsuspecting victims. One such emerging threat is the <em>Lumma Stealer<\/em>\u2014a potent information-stealing malware recently gaining traction through Telegram channels. With Telegram\u2019s popularity as a messaging and sharing platform, threat actors have identified it as a lucrative distribution vector, bypassing traditional detection mechanisms and reaching a broad, often unsuspecting audience.<\/p>\n<p style=\"font-weight: 400;\">Fortunately, McAfee&#8217;s advanced security solutions are equipped to detect and mitigate threats like Lumma Stealer. Through cutting-edge threat intelligence, behavioral analysis, and real-time monitoring, McAfee provides robust defenses against this malware, helping users secure their personal data and digital assets. In this blog, we will explore the tactics, techniques, and procedures (TTPs) used by Lumma Stealer, examine its capabilities, and discuss how McAfee solutions can help safeguard users from this rapidly spreading threat.<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-204234 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/2.jpg\" alt=\"\" width=\"1415\" height=\"914\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/2.jpg 1415w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/2-300x194.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/2-1024x661.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/2-768x496.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/2-200x129.jpg 200w\" sizes=\"auto, (max-width: 1415px) 100vw, 1415px\" \/><\/center><\/p>\n<ul>\n<li>Telegram channel offering malware disguised as crack software<\/li>\n<li>https[:]\/\/t[.]me\/hitbase<\/li>\n<li>Notice the high subscriber count of 42k.<\/li>\n<li>Last post on 3<sup>rd<\/sup> Nov<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204107\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/1.jpg\" alt=\"\" width=\"1562\" height=\"913\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/1.jpg 1562w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/1-300x175.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/1-1024x599.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/1-768x449.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/1-1536x898.jpg 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/1-205x120.jpg 205w\" sizes=\"auto, (max-width: 1562px) 100vw, 1562px\" \/><\/center><\/p>\n<ul>\n<li>Another example of a telegram channel offering malware to benign users.<\/li>\n<li>https[:]\/\/t[.]me\/sharmamod<\/li>\n<li>Subscriber count 8.66k<\/li>\n<li>Last post on 3<sup>rd<\/sup> Nov<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li>Also notice that both the channels are related as they are forwarding messages from each other\u2019s telegram channel.<\/li>\n<li>McAfee detects these fake crack software as [Trojan:Win\/Lummastealer.SD]<\/li>\n<li>Threat Prevalence observed as per McAfee telemetry data.<\/li>\n<li>India is most affected by this threat, followed by the USA and Europe.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204245\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/2.5.jpg\" alt=\"\" width=\"718\" height=\"429\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/2.5.jpg 718w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/2.5-300x179.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/2.5-205x122.jpg 205w\" sizes=\"auto, (max-width: 718px) 100vw, 718px\" \/><\/center><\/p>\n<ul>\n<li>This blog will dissect one specific file, CCleaner 2024.rar. The others are similar in nature except for the theme.<\/li>\n<li>The hash for this file is 3df7a19969e54bd60944372e925ad2fb69503df7159127335f792ad82db7da0b.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204256\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/3.jpg\" alt=\"\" width=\"500\" height=\"179\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/3.jpg 500w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/3-300x107.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/3-205x73.jpg 205w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/center><\/p>\n<ul>\n<li>The extracted rar contains Microsoft DLL files<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204267\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/4.jpg\" alt=\"\" width=\"1039\" height=\"322\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/4.jpg 1039w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/4-300x93.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/4-1024x317.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/4-768x238.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/4-205x64.jpg 205w\" sizes=\"auto, (max-width: 1039px) 100vw, 1039px\" \/><\/center><\/p>\n<ul style=\"font-weight: 400;\">\n<li>Readme.txt contains the link to the telegram channel<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204278\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/5.jpg\" alt=\"\" width=\"265\" height=\"125\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/5.jpg 265w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/5-205x97.jpg 205w\" sizes=\"auto, (max-width: 265px) 100vw, 265px\" \/><\/center><\/p>\n<ul>\n<li>CCleaner 2024.exe is a .NET application<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204289\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/6.jpg\" alt=\"\" width=\"971\" height=\"593\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/6.jpg 971w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/6-300x183.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/6-768x469.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/6-205x125.jpg 205w\" sizes=\"auto, (max-width: 971px) 100vw, 971px\" \/><\/center><\/p>\n<ul>\n<li>We load the file into Dnspy and check the main function.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204300\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/7.jpg\" alt=\"\" width=\"1723\" height=\"650\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/7.jpg 1723w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/7-300x113.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/7-1024x386.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/7-768x290.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/7-1536x579.jpg 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/7-205x77.jpg 205w\" sizes=\"auto, (max-width: 1723px) 100vw, 1723px\" \/><\/center><\/p>\n<ul>\n<li>In this, we have two calls to a function UninitializeBuilder, which decrypts the blob of data that is passed to it (AIOsncoiuuA &amp; UserBuffer) along with the key (Alco and key).<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204311\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/8.jpg\" alt=\"\" width=\"938\" height=\"89\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/8.jpg 938w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/8-300x28.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/8-768x73.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/8-205x19.jpg 205w\" sizes=\"auto, (max-width: 938px) 100vw, 938px\" \/><\/center><\/p>\n<ul>\n<li>Decryption Key (Alco) and Encrypted data (AIOsncoiuuA) for the first call.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204322\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/9.jpg\" alt=\"\" width=\"598\" height=\"520\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/9.jpg 598w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/9-300x261.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/9-148x129.jpg 148w\" sizes=\"auto, (max-width: 598px) 100vw, 598px\" \/><\/center><\/p>\n<ul>\n<li>Decryption Key (Key) and Encrypted data (UserBuffer) for the Second call.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204333\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/10.jpg\" alt=\"\" width=\"519\" height=\"533\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/10.jpg 519w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/10-292x300.jpg 292w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/10-126x129.jpg 126w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/10-24x24.jpg 24w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/10-48x48.jpg 48w\" sizes=\"auto, (max-width: 519px) 100vw, 519px\" \/><\/center><\/p>\n<ul>\n<li>Snippet of the decryption Function.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204344\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/11.jpg\" alt=\"\" width=\"895\" height=\"486\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/11.jpg 895w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/11-300x163.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/11-768x417.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/11-205x111.jpg 205w\" sizes=\"auto, (max-width: 895px) 100vw, 895px\" \/><\/center><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204355\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/12.jpg\" alt=\"\" width=\"771\" height=\"542\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/12.jpg 771w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/12-300x211.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/12-768x540.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/12-184x129.jpg 184w\" sizes=\"auto, (max-width: 771px) 100vw, 771px\" \/><\/center><\/p>\n<ul>\n<li>Decrypted data is saved into variable uiOAshyuxgYUA.<\/li>\n<li>We put a breakpoint on the end of this function and run the program to get the decrypted value of each call.<\/li>\n<li>For the first call, we get the following decrypted data in memory. We see process injection API calls were decrypted in memory.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204366\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/13.jpg\" alt=\"\" width=\"445\" height=\"215\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/13.jpg 445w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/13-300x145.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/13-205x99.jpg 205w\" sizes=\"auto, (max-width: 445px) 100vw, 445px\" \/><\/center><\/p>\n<ul>\n<li>We can also see the target program in which the process injection will take place, in this case, RegAsm.exe.<\/li>\n<li>We can confirm this through the process tree.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204377\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/14.jpg\" alt=\"\" width=\"859\" height=\"278\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/14.jpg 859w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/14-300x97.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/14-768x249.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/14-205x66.jpg 205w\" sizes=\"auto, (max-width: 859px) 100vw, 859px\" \/><\/center><\/p>\n<ul>\n<li>We let the breakpoint hit again to get the next layer decrypted PE file<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204388\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/15.jpg\" alt=\"\" width=\"1314\" height=\"471\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/15.jpg 1314w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/15-300x108.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/15-1024x367.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/15-768x275.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/15-205x73.jpg 205w\" sizes=\"auto, (max-width: 1314px) 100vw, 1314px\" \/><\/center><\/p>\n<ul>\n<li>We can observe the decrypted PE bytes, dump this payload to disk, and inspect the next stage.<\/li>\n<li>Stage1 is a V C++ compiled file.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204399\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/16.jpg\" alt=\"\" width=\"911\" height=\"622\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/16.jpg 911w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/16-300x205.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/16-768x524.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/16-189x129.jpg 189w\" sizes=\"auto, (max-width: 911px) 100vw, 911px\" \/><\/center><\/p>\n<ul>\n<li>We checked the payload sections and discovered that it holds encrypted data.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-204708 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/17-1.jpg\" alt=\"\" width=\"788\" height=\"811\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/17-1.jpg 788w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/17-1-291x300.jpg 291w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/17-1-768x790.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/17-1-125x129.jpg 125w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/17-1-24x24.jpg 24w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/17-1-48x48.jpg 48w\" sizes=\"auto, (max-width: 788px) 100vw, 788px\" \/><\/center><\/p>\n<ul>\n<li>Snippet of the decryption loop.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204421\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/18.jpg\" alt=\"\" width=\"592\" height=\"466\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/18.jpg 592w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/18-300x236.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/18-164x129.jpg 164w\" sizes=\"auto, (max-width: 592px) 100vw, 592px\" \/><\/center><\/p>\n<ul>\n<li>Following decryption, the data is written to two files in the AppData Roaming folder.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204432\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/19.jpg\" alt=\"\" width=\"1021\" height=\"279\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/19.jpg 1021w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/19-300x82.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/19-768x210.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/19-205x56.jpg 205w\" sizes=\"auto, (max-width: 1021px) 100vw, 1021px\" \/><\/center><\/p>\n<ul>\n<li>The first payload written in the AppData\\Roaming folder is the .NET file \u201cXTb9DOBjB3.exe\u201d(Lumma_stealer) and the second payload also .Net file \u201cbTkEBBlC4H.exe\u201d(clipper).<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204443\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/20.jpg\" alt=\"\" width=\"1173\" height=\"346\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/20.jpg 1173w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/20-300x88.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/20-1024x302.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/20-768x227.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/20-205x60.jpg 205w\" sizes=\"auto, (max-width: 1173px) 100vw, 1173px\" \/><\/center><\/p>\n<ul>\n<li>Upon examining both payloads, we observed that they employ the same decryption logic as the main file(ccleaner).<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\">Lumma stealer:<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204454\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/21.jpg\" alt=\"\" width=\"587\" height=\"360\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/21.jpg 587w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/21-300x184.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/21-205x126.jpg 205w\" sizes=\"auto, (max-width: 587px) 100vw, 587px\" \/><\/center><\/p>\n<ul>\n<li>After dumping the payload from the .NET file, we discovered it is a 32-bit GUI Portable Executable.<\/li>\n<li>&#8220;winhttp.dll is dynamically loaded into the program using the LoadLibraryExW function.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204465\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/22.jpg\" alt=\"\" width=\"745\" height=\"97\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/22.jpg 745w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/22-300x39.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/22-205x27.jpg 205w\" sizes=\"auto, (max-width: 745px) 100vw, 745px\" \/><\/center><\/p>\n<ul>\n<li>Upon inspecting the PE file, Base64-encoded strings were identified within the binary.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204476\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/23.jpg\" alt=\"\" width=\"655\" height=\"328\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/23.jpg 655w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/23-300x150.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/23-205x103.jpg 205w\" sizes=\"auto, (max-width: 655px) 100vw, 655px\" \/><\/center><\/p>\n<ul>\n<li>The encoded data is first decoded from Base64 format, converting it back into binary. The decoded data is then passed through a decryption routine to recover the plaintext.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204487\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/24.jpg\" alt=\"\" width=\"875\" height=\"454\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/24.jpg 875w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/24-300x156.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/24-768x398.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/24-205x106.jpg 205w\" sizes=\"auto, (max-width: 875px) 100vw, 875px\" \/><\/center><\/p>\n<ul>\n<li>We observe that the Plaintext resembles a domain, and it\u2019s used to establish communication with a threat actor to exfiltrate the data.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204498\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/25.jpg\" alt=\"\" width=\"791\" height=\"189\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/25.jpg 791w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/25-300x72.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/25-768x184.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/25-205x49.jpg 205w\" sizes=\"auto, (max-width: 791px) 100vw, 791px\" \/><\/center><\/p>\n<ul>\n<li>Code snippet for WinHttpOpenRequest:<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204509\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/26.jpg\" alt=\"\" width=\"1414\" height=\"205\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/26.jpg 1414w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/26-300x43.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/26-1024x148.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/26-768x111.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/26-205x30.jpg 205w\" sizes=\"auto, (max-width: 1414px) 100vw, 1414px\" \/><\/center><\/p>\n<p style=\"font-weight: 400;\">List of Requests with post method:<\/p>\n<ul>\n<li>&#8220;hxxps:\/\/snarlypagowo.site\/api&#8221;<\/li>\n<li>&#8220;hxxps:\/\/questionsmw.store\/api&#8221;<\/li>\n<li>&#8220;hxxps:\/\/soldiefieop.site\/api&#8221;<\/li>\n<li>&#8220;hxxps:\/\/abnomalrkmu.site\/api&#8221;<\/li>\n<li>&#8220;hxxps:\/\/chorusarorp.site\/api&#8221;<\/li>\n<li>&#8220;hxxps:\/\/treatynreit.site\/api&#8221;<\/li>\n<li>&#8220;hxxps:\/\/mysterisop.site\/api&#8221;<\/li>\n<li>&#8220;hxxps:\/\/absorptioniw.site\/api&#8221;<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\">At last, it connects to the steam community<\/p>\n<ul>\n<li>(hxxps:\/\/steamcommunity.com\/profiles\/76561199724331900),<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\">The malware extracts the Steam account name, initially obfuscated to evade detection, and decodes it to reveal the C2 domain. This step is essential for establishing a connection between the compromised device and the attacker&#8217;s server, allowing further malicious activity such as data exfiltration and additional payload delivery. By using this technique, the attackers effectively bypass basic detection mechanisms, making it harder for traditional security solutions to identify the communication with the C2 server.<\/p>\n<ul>\n<li>This is the snippet of the Steam community:<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204520\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/27.jpg\" alt=\"\" width=\"1401\" height=\"841\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/27.jpg 1401w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/27-300x180.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/27-1024x615.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/27-768x461.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/27-205x123.jpg 205w\" sizes=\"auto, (max-width: 1401px) 100vw, 1401px\" \/><\/center><\/p>\n<ul>\n<li>Upon checking the data, it was observed that the user&#8217;s name was obfuscated and had many aliases. We observed that the actual_persona_name fetched and it deobfuscated by the below code.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204531\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/28.jpg\" alt=\"\" width=\"1045\" height=\"519\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/28.jpg 1045w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/28-300x149.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/28-1024x509.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/28-768x381.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/28-205x102.jpg 205w\" sizes=\"auto, (max-width: 1045px) 100vw, 1045px\" \/><\/center><\/p>\n<ul>\n<li>Upon de-obfuscation, we found the plain text and its domain <strong>\u201cmarshal-zhukov.com\u201d<\/strong>.<\/li>\n<\/ul>\n<ul>\n<li>Upon establishing a connection, the C2 server responded with configuration data in Base64 encoded format. The encoded data is first decoded from Base64 format, converting it back into binary. The decoded data is then passed through a decryption routine to recover the plaintext.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204542\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/29.jpg\" alt=\"\" width=\"1047\" height=\"607\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/29.jpg 1047w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/29-300x174.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/29-1024x594.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/29-768x445.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/29-205x119.jpg 205w\" sizes=\"auto, (max-width: 1047px) 100vw, 1047px\" \/><\/center><\/p>\n<ul>\n<li>Config for collecting wallet information.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204553\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/30.jpg\" alt=\"\" width=\"1092\" height=\"839\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/30.jpg 1092w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/30-300x230.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/30-1024x787.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/30-768x590.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/30-168x129.jpg 168w\" sizes=\"auto, (max-width: 1092px) 100vw, 1092px\" \/><\/center><\/p>\n<ul>\n<li>For Browser information:<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204564\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/31.jpg\" alt=\"\" width=\"1214\" height=\"853\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/31.jpg 1214w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/31-300x211.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/31-1024x719.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/31-768x540.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/31-184x129.jpg 184w\" sizes=\"auto, (max-width: 1214px) 100vw, 1214px\" \/><\/center><\/p>\n<ul>\n<li>For FTP and email information:<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204575\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/32.jpg\" alt=\"\" width=\"931\" height=\"853\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/32.jpg 931w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/32-300x275.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/32-768x704.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/32-141x129.jpg 141w\" sizes=\"auto, (max-width: 931px) 100vw, 931px\" \/><\/center><\/p>\n<ul>\n<li>It also collects system information and sends it to c2.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204586\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/33.jpg\" alt=\"\" width=\"522\" height=\"601\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/33.jpg 522w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/33-261x300.jpg 261w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/33-112x129.jpg 112w\" sizes=\"auto, (max-width: 522px) 100vw, 522px\" \/><\/center><\/p>\n<ul>\n<li>Clipper:<\/li>\n<li>Once we dumped the payload from the .NET file, we found that it was a 32-bit .NET executable named \u201cRuntime64.exe.\u201d<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204597\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/34.jpg\" alt=\"\" width=\"599\" height=\"719\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/34.jpg 599w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/34-250x300.jpg 250w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/34-107x129.jpg 107w\" sizes=\"auto, (max-width: 599px) 100vw, 599px\" \/><\/center><\/p>\n<ul>\n<li>We load the file into dnspy and check the main function.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204608\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/35.jpg\" alt=\"\" width=\"598\" height=\"268\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/35.jpg 598w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/35-300x134.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/35-205x92.jpg 205w\" sizes=\"auto, (max-width: 598px) 100vw, 598px\" \/><\/center><\/p>\n<ul>\n<li>It begins by checking the mutex(&#8220;sodfksdkfalksdasgpkprgasdgrrkgwhrterheegwsdfwef&#8221;) to see if it&#8217;s already running on the machine.<\/li>\n<li>Autorun.is_installed: This function checks if the program is set to run on system startup. If autorun is not configured, it adds one to enable automatic execution on startup.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204619\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/36.jpg\" alt=\"\" width=\"1360\" height=\"189\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/36.jpg 1360w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/36-300x42.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/36-1024x142.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/36-768x107.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/36-205x28.jpg 205w\" sizes=\"auto, (max-width: 1360px) 100vw, 1360px\" \/><\/center><\/p>\n<ul>\n<li>This file sets the hidden attribute to false to remove the hidden status and set it as a system file to protect it.<\/li>\n<\/ul>\n<ul>\n<li>This Clipboard Monitor.run function Uses the following regex patterns to match the wallet addresses.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204630\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/37.jpg\" alt=\"\" width=\"671\" height=\"841\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/37.jpg 671w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/37-239x300.jpg 239w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/37-103x129.jpg 103w\" sizes=\"auto, (max-width: 671px) 100vw, 671px\" \/><\/center><\/p>\n<ul>\n<li>If it matches, it replaces the clipboard content with the specified address to hijack the cryptocurrency.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204641\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/38.jpg\" alt=\"\" width=\"956\" height=\"842\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/38.jpg 956w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/38-300x264.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/38-768x676.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/38-146x129.jpg 146w\" sizes=\"auto, (max-width: 956px) 100vw, 956px\" \/><\/center><\/p>\n<ul>\n<li>Code snippet for clipboard monitor and replacement:<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204652\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/39.jpg\" alt=\"\" width=\"822\" height=\"675\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/39.jpg 822w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/39-300x246.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/39-768x631.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/39-157x129.jpg 157w\" sizes=\"auto, (max-width: 822px) 100vw, 822px\" \/><\/center><\/p>\n<h2 style=\"font-weight: 400;\"><strong>Conclusion<\/strong><\/h2>\n<p style=\"font-weight: 400;\">The Lumma Stealer is a stark reminder of the ever-evolving nature of cyber threats and the rapid adaptability of malware tactics. Its spread through Telegram channels demonstrates how easily threat actors can exploit popular platforms to distribute malicious code to a broad audience. With Lumma Stealer capable of stealing sensitive information and compromising user privacy, the potential damage it can cause is significant.<\/p>\n<p style=\"font-weight: 400;\">In this increasingly dangerous cyber landscape, having robust, up-to-date protection has never been more crucial. McAfee\u2019s advanced threat detection and proactive defense mechanisms provide users with a vital safeguard against such threats. By combining real-time monitoring, behavioral analysis, and continuous updates to counter new TTPs, McAfee helps users stay one step ahead of malicious actors. As TTPs evolve rapidly, maintaining comprehensive antivirus protection is essential to safeguarding personal data, financial information, and privacy. Staying vigilant and equipped with the proper security solutions ensures that users are prepared to face the latest threats head-on.<\/p>\n<p style=\"font-weight: 400;\">Indicators of Compromise<\/p>\n<table style=\"font-weight: 400;\">\n<tbody>\n<tr>\n<td width=\"312\">BLTools v4.5.5 New.rar<\/td>\n<td width=\"312\">000756bedf4e95de6781a4193301123032e987aba33dcd55c5e2a9de20a77418<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Blum Auto Bot Token.rar<\/td>\n<td width=\"312\">06715881cd4694a0de28f8d2e3a8cc17939e83a4ca4dee2ebb3078fc25664180<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Netflix Online Video 2024.rar<\/td>\n<td width=\"312\">072aa67c14d047621e0065e8529fadd0aac1c1324e10e5d027c10073fffcd023<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">YouTube Downloader Version 2.1.6.rar<\/td>\n<td width=\"312\">1724f486563c5715ce1fe989e8f4ca01890970816c5ffc2e5d0221e38cf9fdb9<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Full Adobe Photoshop 2024 + CDkey.rar<\/td>\n<td width=\"312\">174690d86d36c648a2d5a595bc8cfae70c157f00c750c36fd1a29f52011af5e2<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Youtube Downloader Video 2024 Version.rar<\/td>\n<td width=\"312\">18aca8b28750c9673f1c467f5eab1bbae4ad6c79f3fe598318c203c8e664d44f<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">ChatGPT-5 Version 2024 .rar<\/td>\n<td width=\"312\">24a32d763e458e5440cb18f87685cc5626bf62cd9c3ca7bab10f0ced629708ee<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Valorant Checker by Xinax 2024.rar<\/td>\n<td width=\"312\">31a818c75d35bafc58c62c7522503f90be7b684803883e5f07c4cc16f517d1d0<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Activation Windows 8,10,11 FULL + CDkey.rar<\/td>\n<td width=\"312\">338ec6016db4eb95b15bc0822fc1d745f107ae0739a57b41ef10c9f64b6c8077<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Ccleaner 2024.rar<\/td>\n<td width=\"312\">3df7a19969e54bd60944372e925ad2fb69503df7159127335f792ad82db7da0b<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">CC Checker AcTeam 2024 New.rar<\/td>\n<td width=\"312\">535650b613161c011086eab9d87189aa637f8575e52442db6e81602e67a2e4f4<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Netflix mail access Checker 2024 New.rar<\/td>\n<td width=\"312\">61a17a91ce2a98b455a50ff37b33368fe3b2f3a516cf94c5d7b18e386274557b<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Paypal Checker New 2024 version.rar<\/td>\n<td width=\"312\">840a255a184d3e819a07e3749b5e32da84f607ac7025366967d12dac0c5fa859<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Free YouTube Downloader 2024.rar<\/td>\n<td width=\"312\">9be6ea9ab019c7bd59fab7097ceb9cd465a6ae0c6b9a50d55432a0bfb5e1f184<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Microsoft Office 2024 + CDkey.rar<\/td>\n<td width=\"312\">a541b66785534bca646a7691c7a2a5630947ecbd4ee2544b19a5f8347f70f923<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Crypto Seed Checker 2024 version.rar<\/td>\n<td width=\"312\">ac5c6793354b2be799ce755828d72f65a0c2ea63ccc942208c22e893a251b52c<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Phemex CryptoBot.rar<\/td>\n<td width=\"312\">b53e0759fa11d6d31b837adf5c5ceda40dd01aa331aa42256282f9ca46531f25<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">SQLi Dumper v10.5.rar<\/td>\n<td width=\"312\">ce8e7b2a6222aa8678f0c73bd29a9e3a358f464310002684d7c46b2b9e8dcf23<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Cyber Ghost VPN + Key master.rar<\/td>\n<td width=\"312\">d31520c4a77f01f0491ef5ecf03c487975182de7264d7dce0fb7988e0cea7248<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">AIO checker New Version 9.10.rar<\/td>\n<td width=\"312\">d67cc175e2bb94e2006f2700c1b052123961f5f64a18a00c8787c4aa6071146f<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Spotify Desktop Version 2024.rar<\/td>\n<td width=\"312\">e71e23ad0e5e8b289f1959579fb185c34961a644d0e24a7466265bef07eab8ec<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Nord VPN 2024 + Key.rar<\/td>\n<td width=\"312\">fa34c20e1de65bfff3c0e60d25748927aa83d3ea9f4029e59aaedb4801220a54<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Paysafecard Checker 2024 version.rar<\/td>\n<td width=\"312\">fb60510e8595b773abde86f6f1792890978cd6efc924c187cb664d49ef05a250<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">TradingView 2024 New Version (Desktop).rar<\/td>\n<td width=\"312\">fdc6ebf3968cd2dfcc8ad05202a847d7f8b2a70746800fd240e6c5136fcd34f6<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Telegram channel<\/td>\n<td width=\"312\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0 https[:]\/\/t[.]me\/hitbase<\/p>\n<p>&nbsp;<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Telegram channel<\/p>\n<p>&nbsp;<\/td>\n<td width=\"312\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0 https[:]\/\/t[.]me\/sharmamod<\/p>\n<p>&nbsp;<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">C2<\/td>\n<td width=\"312\">marshal-zhukov.com<\/p>\n<p>&nbsp;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><em>Mohanasundaram and Neil Tyagi<\/em><\/p>\n<p style=\"font-weight: 400;\">In today\u2019s rapidly evolving cyber landscape, malware threats continue to adapt, employing new tactics and leveraging popular platforms to reach unsuspecting victims. One such emerging threat is the <em>Lumma Stealer<\/em>\u2014a potent information-stealing malware recently gaining traction through Telegram channels. With Telegram\u2019s popularity as a messaging and sharing platform, threat actors have identified it as a lucrative distribution vector, bypassing traditional detection mechanisms and reaching a broad, often unsuspecting audience.<\/p>\n<p style=\"font-weight: 400;\">Fortunately, McAfee&#8217;s advanced security solutions are equipped to detect and mitigate threats like Lumma Stealer. Through cutting-edge threat intelligence, behavioral analysis, and real-time monitoring, McAfee provides robust defenses against this malware, helping users secure their personal data and digital assets. In this blog, we will explore the tactics, techniques, and procedures (TTPs) used by Lumma Stealer, examine its capabilities, and discuss how McAfee solutions can help safeguard users from this rapidly spreading threat.<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-204234 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/2.jpg\" alt=\"\" width=\"1415\" height=\"914\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/2.jpg 1415w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/2-300x194.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/2-1024x661.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/2-768x496.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/2-200x129.jpg 200w\" sizes=\"auto, (max-width: 1415px) 100vw, 1415px\" \/><\/center><\/p>\n<ul>\n<li>Telegram channel offering malware disguised as crack software<\/li>\n<li>https[:]\/\/t[.]me\/hitbase<\/li>\n<li>Notice the high subscriber count of 42k.<\/li>\n<li>Last post on 3<sup>rd<\/sup> Nov<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204107\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/1.jpg\" alt=\"\" width=\"1562\" height=\"913\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/1.jpg 1562w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/1-300x175.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/1-1024x599.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/1-768x449.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/1-1536x898.jpg 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/1-205x120.jpg 205w\" sizes=\"auto, (max-width: 1562px) 100vw, 1562px\" \/><\/center><\/p>\n<ul>\n<li>Another example of a telegram channel offering malware to benign users.<\/li>\n<li>https[:]\/\/t[.]me\/sharmamod<\/li>\n<li>Subscriber count 8.66k<\/li>\n<li>Last post on 3<sup>rd<\/sup> Nov<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li>Also notice that both the channels are related as they are forwarding messages from each other\u2019s telegram channel.<\/li>\n<li>McAfee detects these fake crack software as [Trojan:Win\/Lummastealer.SD]<\/li>\n<li>Threat Prevalence observed as per McAfee telemetry data.<\/li>\n<li>India is most affected by this threat, followed by the USA and Europe.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204245\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/2.5.jpg\" alt=\"\" width=\"718\" height=\"429\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/2.5.jpg 718w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/2.5-300x179.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/2.5-205x122.jpg 205w\" sizes=\"auto, (max-width: 718px) 100vw, 718px\" \/><\/center><\/p>\n<ul>\n<li>This blog will dissect one specific file, CCleaner 2024.rar. The others are similar in nature except for the theme.<\/li>\n<li>The hash for this file is 3df7a19969e54bd60944372e925ad2fb69503df7159127335f792ad82db7da0b.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204256\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/3.jpg\" alt=\"\" width=\"500\" height=\"179\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/3.jpg 500w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/3-300x107.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/3-205x73.jpg 205w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/center><\/p>\n<ul>\n<li>The extracted rar contains Microsoft DLL files<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204267\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/4.jpg\" alt=\"\" width=\"1039\" height=\"322\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/4.jpg 1039w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/4-300x93.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/4-1024x317.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/4-768x238.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/4-205x64.jpg 205w\" sizes=\"auto, (max-width: 1039px) 100vw, 1039px\" \/><\/center><\/p>\n<ul style=\"font-weight: 400;\">\n<li>Readme.txt contains the link to the telegram channel<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204278\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/5.jpg\" alt=\"\" width=\"265\" height=\"125\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/5.jpg 265w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/5-205x97.jpg 205w\" sizes=\"auto, (max-width: 265px) 100vw, 265px\" \/><\/center><\/p>\n<ul>\n<li>CCleaner 2024.exe is a .NET application<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204289\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/6.jpg\" alt=\"\" width=\"971\" height=\"593\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/6.jpg 971w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/6-300x183.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/6-768x469.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/6-205x125.jpg 205w\" sizes=\"auto, (max-width: 971px) 100vw, 971px\" \/><\/center><\/p>\n<ul>\n<li>We load the file into Dnspy and check the main function.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204300\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/7.jpg\" alt=\"\" width=\"1723\" height=\"650\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/7.jpg 1723w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/7-300x113.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/7-1024x386.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/7-768x290.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/7-1536x579.jpg 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/7-205x77.jpg 205w\" sizes=\"auto, (max-width: 1723px) 100vw, 1723px\" \/><\/center><\/p>\n<ul>\n<li>In this, we have two calls to a function UninitializeBuilder, which decrypts the blob of data that is passed to it (AIOsncoiuuA &amp; UserBuffer) along with the key (Alco and key).<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204311\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/8.jpg\" alt=\"\" width=\"938\" height=\"89\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/8.jpg 938w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/8-300x28.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/8-768x73.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/8-205x19.jpg 205w\" sizes=\"auto, (max-width: 938px) 100vw, 938px\" \/><\/center><\/p>\n<ul>\n<li>Decryption Key (Alco) and Encrypted data (AIOsncoiuuA) for the first call.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204322\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/9.jpg\" alt=\"\" width=\"598\" height=\"520\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/9.jpg 598w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/9-300x261.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/9-148x129.jpg 148w\" sizes=\"auto, (max-width: 598px) 100vw, 598px\" \/><\/center><\/p>\n<ul>\n<li>Decryption Key (Key) and Encrypted data (UserBuffer) for the Second call.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204333\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/10.jpg\" alt=\"\" width=\"519\" height=\"533\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/10.jpg 519w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/10-292x300.jpg 292w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/10-126x129.jpg 126w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/10-24x24.jpg 24w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/10-48x48.jpg 48w\" sizes=\"auto, (max-width: 519px) 100vw, 519px\" \/><\/center><\/p>\n<ul>\n<li>Snippet of the decryption Function.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204344\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/11.jpg\" alt=\"\" width=\"895\" height=\"486\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/11.jpg 895w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/11-300x163.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/11-768x417.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/11-205x111.jpg 205w\" sizes=\"auto, (max-width: 895px) 100vw, 895px\" \/><\/center><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204355\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/12.jpg\" alt=\"\" width=\"771\" height=\"542\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/12.jpg 771w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/12-300x211.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/12-768x540.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/12-184x129.jpg 184w\" sizes=\"auto, (max-width: 771px) 100vw, 771px\" \/><\/center><\/p>\n<ul>\n<li>Decrypted data is saved into variable uiOAshyuxgYUA.<\/li>\n<li>We put a breakpoint on the end of this function and run the program to get the decrypted value of each call.<\/li>\n<li>For the first call, we get the following decrypted data in memory. We see process injection API calls were decrypted in memory.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204366\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/13.jpg\" alt=\"\" width=\"445\" height=\"215\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/13.jpg 445w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/13-300x145.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/13-205x99.jpg 205w\" sizes=\"auto, (max-width: 445px) 100vw, 445px\" \/><\/center><\/p>\n<ul>\n<li>We can also see the target program in which the process injection will take place, in this case, RegAsm.exe.<\/li>\n<li>We can confirm this through the process tree.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204377\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/14.jpg\" alt=\"\" width=\"859\" height=\"278\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/14.jpg 859w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/14-300x97.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/14-768x249.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/14-205x66.jpg 205w\" sizes=\"auto, (max-width: 859px) 100vw, 859px\" \/><\/center><\/p>\n<ul>\n<li>We let the breakpoint hit again to get the next layer decrypted PE file<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204388\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/15.jpg\" alt=\"\" width=\"1314\" height=\"471\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/15.jpg 1314w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/15-300x108.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/15-1024x367.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/15-768x275.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/15-205x73.jpg 205w\" sizes=\"auto, (max-width: 1314px) 100vw, 1314px\" \/><\/center><\/p>\n<ul>\n<li>We can observe the decrypted PE bytes, dump this payload to disk, and inspect the next stage.<\/li>\n<li>Stage1 is a V C++ compiled file.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204399\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/16.jpg\" alt=\"\" width=\"911\" height=\"622\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/16.jpg 911w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/16-300x205.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/16-768x524.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/16-189x129.jpg 189w\" sizes=\"auto, (max-width: 911px) 100vw, 911px\" \/><\/center><\/p>\n<ul>\n<li>We checked the payload sections and discovered that it holds encrypted data.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-204708 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/17-1.jpg\" alt=\"\" width=\"788\" height=\"811\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/17-1.jpg 788w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/17-1-291x300.jpg 291w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/17-1-768x790.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/17-1-125x129.jpg 125w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/17-1-24x24.jpg 24w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/17-1-48x48.jpg 48w\" sizes=\"auto, (max-width: 788px) 100vw, 788px\" \/><\/center><\/p>\n<ul>\n<li>Snippet of the decryption loop.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204421\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/18.jpg\" alt=\"\" width=\"592\" height=\"466\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/18.jpg 592w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/18-300x236.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/18-164x129.jpg 164w\" sizes=\"auto, (max-width: 592px) 100vw, 592px\" \/><\/center><\/p>\n<ul>\n<li>Following decryption, the data is written to two files in the AppData Roaming folder.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204432\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/19.jpg\" alt=\"\" width=\"1021\" height=\"279\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/19.jpg 1021w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/19-300x82.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/19-768x210.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/19-205x56.jpg 205w\" sizes=\"auto, (max-width: 1021px) 100vw, 1021px\" \/><\/center><\/p>\n<ul>\n<li>The first payload written in the AppData\\Roaming folder is the .NET file \u201cXTb9DOBjB3.exe\u201d(Lumma_stealer) and the second payload also .Net file \u201cbTkEBBlC4H.exe\u201d(clipper).<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204443\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/20.jpg\" alt=\"\" width=\"1173\" height=\"346\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/20.jpg 1173w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/20-300x88.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/20-1024x302.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/20-768x227.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/20-205x60.jpg 205w\" sizes=\"auto, (max-width: 1173px) 100vw, 1173px\" \/><\/center><\/p>\n<ul>\n<li>Upon examining both payloads, we observed that they employ the same decryption logic as the main file(ccleaner).<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\">Lumma stealer:<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204454\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/21.jpg\" alt=\"\" width=\"587\" height=\"360\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/21.jpg 587w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/21-300x184.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/21-205x126.jpg 205w\" sizes=\"auto, (max-width: 587px) 100vw, 587px\" \/><\/center><\/p>\n<ul>\n<li>After dumping the payload from the .NET file, we discovered it is a 32-bit GUI Portable Executable.<\/li>\n<li>&#8220;winhttp.dll is dynamically loaded into the program using the LoadLibraryExW function.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204465\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/22.jpg\" alt=\"\" width=\"745\" height=\"97\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/22.jpg 745w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/22-300x39.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/22-205x27.jpg 205w\" sizes=\"auto, (max-width: 745px) 100vw, 745px\" \/><\/center><\/p>\n<ul>\n<li>Upon inspecting the PE file, Base64-encoded strings were identified within the binary.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204476\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/23.jpg\" alt=\"\" width=\"655\" height=\"328\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/23.jpg 655w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/23-300x150.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/23-205x103.jpg 205w\" sizes=\"auto, (max-width: 655px) 100vw, 655px\" \/><\/center><\/p>\n<ul>\n<li>The encoded data is first decoded from Base64 format, converting it back into binary. The decoded data is then passed through a decryption routine to recover the plaintext.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204487\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/24.jpg\" alt=\"\" width=\"875\" height=\"454\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/24.jpg 875w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/24-300x156.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/24-768x398.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/24-205x106.jpg 205w\" sizes=\"auto, (max-width: 875px) 100vw, 875px\" \/><\/center><\/p>\n<ul>\n<li>We observe that the Plaintext resembles a domain, and it\u2019s used to establish communication with a threat actor to exfiltrate the data.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204498\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/25.jpg\" alt=\"\" width=\"791\" height=\"189\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/25.jpg 791w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/25-300x72.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/25-768x184.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/25-205x49.jpg 205w\" sizes=\"auto, (max-width: 791px) 100vw, 791px\" \/><\/center><\/p>\n<ul>\n<li>Code snippet for WinHttpOpenRequest:<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204509\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/26.jpg\" alt=\"\" width=\"1414\" height=\"205\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/26.jpg 1414w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/26-300x43.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/26-1024x148.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/26-768x111.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/26-205x30.jpg 205w\" sizes=\"auto, (max-width: 1414px) 100vw, 1414px\" \/><\/center><\/p>\n<p style=\"font-weight: 400;\">List of Requests with post method:<\/p>\n<ul>\n<li>&#8220;hxxps:\/\/snarlypagowo.site\/api&#8221;<\/li>\n<li>&#8220;hxxps:\/\/questionsmw.store\/api&#8221;<\/li>\n<li>&#8220;hxxps:\/\/soldiefieop.site\/api&#8221;<\/li>\n<li>&#8220;hxxps:\/\/abnomalrkmu.site\/api&#8221;<\/li>\n<li>&#8220;hxxps:\/\/chorusarorp.site\/api&#8221;<\/li>\n<li>&#8220;hxxps:\/\/treatynreit.site\/api&#8221;<\/li>\n<li>&#8220;hxxps:\/\/mysterisop.site\/api&#8221;<\/li>\n<li>&#8220;hxxps:\/\/absorptioniw.site\/api&#8221;<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\">At last, it connects to the steam community<\/p>\n<ul>\n<li>(hxxps:\/\/steamcommunity.com\/profiles\/76561199724331900),<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\">The malware extracts the Steam account name, initially obfuscated to evade detection, and decodes it to reveal the C2 domain. This step is essential for establishing a connection between the compromised device and the attacker&#8217;s server, allowing further malicious activity such as data exfiltration and additional payload delivery. By using this technique, the attackers effectively bypass basic detection mechanisms, making it harder for traditional security solutions to identify the communication with the C2 server.<\/p>\n<ul>\n<li>This is the snippet of the Steam community:<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204520\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/27.jpg\" alt=\"\" width=\"1401\" height=\"841\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/27.jpg 1401w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/27-300x180.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/27-1024x615.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/27-768x461.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/27-205x123.jpg 205w\" sizes=\"auto, (max-width: 1401px) 100vw, 1401px\" \/><\/center><\/p>\n<ul>\n<li>Upon checking the data, it was observed that the user&#8217;s name was obfuscated and had many aliases. We observed that the actual_persona_name fetched and it deobfuscated by the below code.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204531\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/28.jpg\" alt=\"\" width=\"1045\" height=\"519\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/28.jpg 1045w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/28-300x149.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/28-1024x509.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/28-768x381.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/28-205x102.jpg 205w\" sizes=\"auto, (max-width: 1045px) 100vw, 1045px\" \/><\/center><\/p>\n<ul>\n<li>Upon de-obfuscation, we found the plain text and its domain <strong>\u201cmarshal-zhukov.com\u201d<\/strong>.<\/li>\n<\/ul>\n<ul>\n<li>Upon establishing a connection, the C2 server responded with configuration data in Base64 encoded format. The encoded data is first decoded from Base64 format, converting it back into binary. The decoded data is then passed through a decryption routine to recover the plaintext.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204542\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/29.jpg\" alt=\"\" width=\"1047\" height=\"607\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/29.jpg 1047w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/29-300x174.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/29-1024x594.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/29-768x445.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/29-205x119.jpg 205w\" sizes=\"auto, (max-width: 1047px) 100vw, 1047px\" \/><\/center><\/p>\n<ul>\n<li>Config for collecting wallet information.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204553\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/30.jpg\" alt=\"\" width=\"1092\" height=\"839\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/30.jpg 1092w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/30-300x230.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/30-1024x787.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/30-768x590.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/30-168x129.jpg 168w\" sizes=\"auto, (max-width: 1092px) 100vw, 1092px\" \/><\/center><\/p>\n<ul>\n<li>For Browser information:<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204564\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/31.jpg\" alt=\"\" width=\"1214\" height=\"853\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/31.jpg 1214w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/31-300x211.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/31-1024x719.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/31-768x540.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/31-184x129.jpg 184w\" sizes=\"auto, (max-width: 1214px) 100vw, 1214px\" \/><\/center><\/p>\n<ul>\n<li>For FTP and email information:<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204575\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/32.jpg\" alt=\"\" width=\"931\" height=\"853\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/32.jpg 931w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/32-300x275.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/32-768x704.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/32-141x129.jpg 141w\" sizes=\"auto, (max-width: 931px) 100vw, 931px\" \/><\/center><\/p>\n<ul>\n<li>It also collects system information and sends it to c2.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204586\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/33.jpg\" alt=\"\" width=\"522\" height=\"601\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/33.jpg 522w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/33-261x300.jpg 261w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/33-112x129.jpg 112w\" sizes=\"auto, (max-width: 522px) 100vw, 522px\" \/><\/center><\/p>\n<ul>\n<li>Clipper:<\/li>\n<li>Once we dumped the payload from the .NET file, we found that it was a 32-bit .NET executable named \u201cRuntime64.exe.\u201d<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204597\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/34.jpg\" alt=\"\" width=\"599\" height=\"719\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/34.jpg 599w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/34-250x300.jpg 250w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/34-107x129.jpg 107w\" sizes=\"auto, (max-width: 599px) 100vw, 599px\" \/><\/center><\/p>\n<ul>\n<li>We load the file into dnspy and check the main function.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204608\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/35.jpg\" alt=\"\" width=\"598\" height=\"268\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/35.jpg 598w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/35-300x134.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/35-205x92.jpg 205w\" sizes=\"auto, (max-width: 598px) 100vw, 598px\" \/><\/center><\/p>\n<ul>\n<li>It begins by checking the mutex(&#8220;sodfksdkfalksdasgpkprgasdgrrkgwhrterheegwsdfwef&#8221;) to see if it&#8217;s already running on the machine.<\/li>\n<li>Autorun.is_installed: This function checks if the program is set to run on system startup. If autorun is not configured, it adds one to enable automatic execution on startup.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204619\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/36.jpg\" alt=\"\" width=\"1360\" height=\"189\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/36.jpg 1360w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/36-300x42.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/36-1024x142.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/36-768x107.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/36-205x28.jpg 205w\" sizes=\"auto, (max-width: 1360px) 100vw, 1360px\" \/><\/center><\/p>\n<ul>\n<li>This file sets the hidden attribute to false to remove the hidden status and set it as a system file to protect it.<\/li>\n<\/ul>\n<ul>\n<li>This Clipboard Monitor.run function Uses the following regex patterns to match the wallet addresses.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204630\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/37.jpg\" alt=\"\" width=\"671\" height=\"841\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/37.jpg 671w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/37-239x300.jpg 239w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/37-103x129.jpg 103w\" sizes=\"auto, (max-width: 671px) 100vw, 671px\" \/><\/center><\/p>\n<ul>\n<li>If it matches, it replaces the clipboard content with the specified address to hijack the cryptocurrency.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204641\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/38.jpg\" alt=\"\" width=\"956\" height=\"842\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/38.jpg 956w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/38-300x264.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/38-768x676.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/38-146x129.jpg 146w\" sizes=\"auto, (max-width: 956px) 100vw, 956px\" \/><\/center><\/p>\n<ul>\n<li>Code snippet for clipboard monitor and replacement:<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-204652\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/39.jpg\" alt=\"\" width=\"822\" height=\"675\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/39.jpg 822w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/39-300x246.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/39-768x631.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/11\/39-157x129.jpg 157w\" sizes=\"auto, (max-width: 822px) 100vw, 822px\" \/><\/center><\/p>\n<h2 style=\"font-weight: 400;\"><strong>Conclusion<\/strong><\/h2>\n<p style=\"font-weight: 400;\">The Lumma Stealer is a stark reminder of the ever-evolving nature of cyber threats and the rapid adaptability of malware tactics. Its spread through Telegram channels demonstrates how easily threat actors can exploit popular platforms to distribute malicious code to a broad audience. With Lumma Stealer capable of stealing sensitive information and compromising user privacy, the potential damage it can cause is significant.<\/p>\n<p style=\"font-weight: 400;\">In this increasingly dangerous cyber landscape, having robust, up-to-date protection has never been more crucial. McAfee\u2019s advanced threat detection and proactive defense mechanisms provide users with a vital safeguard against such threats. By combining real-time monitoring, behavioral analysis, and continuous updates to counter new TTPs, McAfee helps users stay one step ahead of malicious actors. As TTPs evolve rapidly, maintaining comprehensive antivirus protection is essential to safeguarding personal data, financial information, and privacy. Staying vigilant and equipped with the proper security solutions ensures that users are prepared to face the latest threats head-on.<\/p>\n<p style=\"font-weight: 400;\">Indicators of Compromise<\/p>\n<table style=\"font-weight: 400;\">\n<tbody>\n<tr>\n<td width=\"312\">BLTools v4.5.5 New.rar<\/td>\n<td width=\"312\">000756bedf4e95de6781a4193301123032e987aba33dcd55c5e2a9de20a77418<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Blum Auto Bot Token.rar<\/td>\n<td width=\"312\">06715881cd4694a0de28f8d2e3a8cc17939e83a4ca4dee2ebb3078fc25664180<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Netflix Online Video 2024.rar<\/td>\n<td width=\"312\">072aa67c14d047621e0065e8529fadd0aac1c1324e10e5d027c10073fffcd023<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">YouTube Downloader Version 2.1.6.rar<\/td>\n<td width=\"312\">1724f486563c5715ce1fe989e8f4ca01890970816c5ffc2e5d0221e38cf9fdb9<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Full Adobe Photoshop 2024 + CDkey.rar<\/td>\n<td width=\"312\">174690d86d36c648a2d5a595bc8cfae70c157f00c750c36fd1a29f52011af5e2<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Youtube Downloader Video 2024 Version.rar<\/td>\n<td width=\"312\">18aca8b28750c9673f1c467f5eab1bbae4ad6c79f3fe598318c203c8e664d44f<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">ChatGPT-5 Version 2024 .rar<\/td>\n<td width=\"312\">24a32d763e458e5440cb18f87685cc5626bf62cd9c3ca7bab10f0ced629708ee<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Valorant Checker by Xinax 2024.rar<\/td>\n<td width=\"312\">31a818c75d35bafc58c62c7522503f90be7b684803883e5f07c4cc16f517d1d0<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Activation Windows 8,10,11 FULL + CDkey.rar<\/td>\n<td width=\"312\">338ec6016db4eb95b15bc0822fc1d745f107ae0739a57b41ef10c9f64b6c8077<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Ccleaner 2024.rar<\/td>\n<td width=\"312\">3df7a19969e54bd60944372e925ad2fb69503df7159127335f792ad82db7da0b<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">CC Checker AcTeam 2024 New.rar<\/td>\n<td width=\"312\">535650b613161c011086eab9d87189aa637f8575e52442db6e81602e67a2e4f4<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Netflix mail access Checker 2024 New.rar<\/td>\n<td width=\"312\">61a17a91ce2a98b455a50ff37b33368fe3b2f3a516cf94c5d7b18e386274557b<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Paypal Checker New 2024 version.rar<\/td>\n<td width=\"312\">840a255a184d3e819a07e3749b5e32da84f607ac7025366967d12dac0c5fa859<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Free YouTube Downloader 2024.rar<\/td>\n<td width=\"312\">9be6ea9ab019c7bd59fab7097ceb9cd465a6ae0c6b9a50d55432a0bfb5e1f184<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Microsoft Office 2024 + CDkey.rar<\/td>\n<td width=\"312\">a541b66785534bca646a7691c7a2a5630947ecbd4ee2544b19a5f8347f70f923<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Crypto Seed Checker 2024 version.rar<\/td>\n<td width=\"312\">ac5c6793354b2be799ce755828d72f65a0c2ea63ccc942208c22e893a251b52c<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Phemex CryptoBot.rar<\/td>\n<td width=\"312\">b53e0759fa11d6d31b837adf5c5ceda40dd01aa331aa42256282f9ca46531f25<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">SQLi Dumper v10.5.rar<\/td>\n<td width=\"312\">ce8e7b2a6222aa8678f0c73bd29a9e3a358f464310002684d7c46b2b9e8dcf23<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Cyber Ghost VPN + Key master.rar<\/td>\n<td width=\"312\">d31520c4a77f01f0491ef5ecf03c487975182de7264d7dce0fb7988e0cea7248<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">AIO checker New Version 9.10.rar<\/td>\n<td width=\"312\">d67cc175e2bb94e2006f2700c1b052123961f5f64a18a00c8787c4aa6071146f<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Spotify Desktop Version 2024.rar<\/td>\n<td width=\"312\">e71e23ad0e5e8b289f1959579fb185c34961a644d0e24a7466265bef07eab8ec<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Nord VPN 2024 + Key.rar<\/td>\n<td width=\"312\">fa34c20e1de65bfff3c0e60d25748927aa83d3ea9f4029e59aaedb4801220a54<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Paysafecard Checker 2024 version.rar<\/td>\n<td width=\"312\">fb60510e8595b773abde86f6f1792890978cd6efc924c187cb664d49ef05a250<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">TradingView 2024 New Version (Desktop).rar<\/td>\n<td width=\"312\">fdc6ebf3968cd2dfcc8ad05202a847d7f8b2a70746800fd240e6c5136fcd34f6<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Telegram channel<\/td>\n<td width=\"312\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0 https[:]\/\/t[.]me\/hitbase<\/p>\n<p>&nbsp;<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Telegram channel<\/p>\n<p>&nbsp;<\/td>\n<td width=\"312\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0 https[:]\/\/t[.]me\/sharmamod<\/p>\n<p>&nbsp;<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">C2<\/td>\n<td width=\"312\">marshal-zhukov.com<\/p>\n<p>&nbsp;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"font-weight: 400;\">\n","protected":false},"excerpt":{"rendered":"<p>Authored by: M. Authored by: M, Mohanasundaram and Neil Tyagi In today\u2019s rapidly evolving cyber landscape, malware threats continue to&#8230;<\/p>\n","protected":false},"author":695,"featured_media":200112,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[4136],"class_list":["post-204698","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Lumma Stealer on the Rise: How Telegram Channels Are Fueling Malware Proliferation | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Authored by: M. Authored by: M, Mohanasundaram and Neil Tyagi In today\u2019s rapidly evolving cyber landscape, malware threats continue to adapt, employing\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Lumma Stealer on the Rise: How Telegram Channels Are Fueling Malware Proliferation | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Authored by: M. Authored by: M, Mohanasundaram and Neil Tyagi In today\u2019s rapidly evolving cyber landscape, malware threats continue to adapt, employing\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lumma-stealer-on-the-rise-how-telegram-channels-are-fueling-malware-proliferation\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-21T04:46:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/09\/300x200_Blog_042723.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"17 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lumma-stealer-on-the-rise-how-telegram-channels-are-fueling-malware-proliferation\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lumma-stealer-on-the-rise-how-telegram-channels-are-fueling-malware-proliferation\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"Lumma Stealer on the Rise: How Telegram Channels Are Fueling Malware Proliferation\",\"datePublished\":\"2024-11-21T04:46:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lumma-stealer-on-the-rise-how-telegram-channels-are-fueling-malware-proliferation\/\"},\"wordCount\":3430,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lumma-stealer-on-the-rise-how-telegram-channels-are-fueling-malware-proliferation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/09\/300x200_Blog_042723.png\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lumma-stealer-on-the-rise-how-telegram-channels-are-fueling-malware-proliferation\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lumma-stealer-on-the-rise-how-telegram-channels-are-fueling-malware-proliferation\/\",\"name\":\"Lumma Stealer on the Rise: How Telegram Channels Are Fueling Malware Proliferation | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lumma-stealer-on-the-rise-how-telegram-channels-are-fueling-malware-proliferation\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lumma-stealer-on-the-rise-how-telegram-channels-are-fueling-malware-proliferation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/09\/300x200_Blog_042723.png\",\"datePublished\":\"2024-11-21T04:46:51+00:00\",\"description\":\"Authored by: M. Authored by: M, Mohanasundaram and Neil Tyagi In today\u2019s rapidly evolving cyber landscape, malware threats continue to adapt, employing\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lumma-stealer-on-the-rise-how-telegram-channels-are-fueling-malware-proliferation\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lumma-stealer-on-the-rise-how-telegram-channels-are-fueling-malware-proliferation\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lumma-stealer-on-the-rise-how-telegram-channels-are-fueling-malware-proliferation\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/09\/300x200_Blog_042723.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/09\/300x200_Blog_042723.png\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lumma-stealer-on-the-rise-how-telegram-channels-are-fueling-malware-proliferation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Lumma Stealer on the Rise: How Telegram Channels Are Fueling Malware Proliferation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Lumma Stealer on the Rise: How Telegram Channels Are Fueling Malware Proliferation | McAfee Blog","description":"Authored by: M. Authored by: M, Mohanasundaram and Neil Tyagi In today\u2019s rapidly evolving cyber landscape, malware threats continue to adapt, employing","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Lumma Stealer on the Rise: How Telegram Channels Are Fueling Malware Proliferation | McAfee Blog","og_description":"Authored by: M. Authored by: M, Mohanasundaram and Neil Tyagi In today\u2019s rapidly evolving cyber landscape, malware threats continue to adapt, employing","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lumma-stealer-on-the-rise-how-telegram-channels-are-fueling-malware-proliferation\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2024-11-21T04:46:51+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/09\/300x200_Blog_042723.png","type":"image\/png"}],"author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"17 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lumma-stealer-on-the-rise-how-telegram-channels-are-fueling-malware-proliferation\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lumma-stealer-on-the-rise-how-telegram-channels-are-fueling-malware-proliferation\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"Lumma Stealer on the Rise: How Telegram Channels Are Fueling Malware Proliferation","datePublished":"2024-11-21T04:46:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lumma-stealer-on-the-rise-how-telegram-channels-are-fueling-malware-proliferation\/"},"wordCount":3430,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lumma-stealer-on-the-rise-how-telegram-channels-are-fueling-malware-proliferation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/09\/300x200_Blog_042723.png","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lumma-stealer-on-the-rise-how-telegram-channels-are-fueling-malware-proliferation\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lumma-stealer-on-the-rise-how-telegram-channels-are-fueling-malware-proliferation\/","name":"Lumma Stealer on the Rise: How Telegram Channels Are Fueling Malware Proliferation | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lumma-stealer-on-the-rise-how-telegram-channels-are-fueling-malware-proliferation\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lumma-stealer-on-the-rise-how-telegram-channels-are-fueling-malware-proliferation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/09\/300x200_Blog_042723.png","datePublished":"2024-11-21T04:46:51+00:00","description":"Authored by: M. Authored by: M, Mohanasundaram and Neil Tyagi In today\u2019s rapidly evolving cyber landscape, malware threats continue to adapt, employing","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lumma-stealer-on-the-rise-how-telegram-channels-are-fueling-malware-proliferation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lumma-stealer-on-the-rise-how-telegram-channels-are-fueling-malware-proliferation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lumma-stealer-on-the-rise-how-telegram-channels-are-fueling-malware-proliferation\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/09\/300x200_Blog_042723.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/09\/300x200_Blog_042723.png","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/lumma-stealer-on-the-rise-how-telegram-channels-are-fueling-malware-proliferation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Lumma Stealer on the Rise: How Telegram Channels Are Fueling Malware Proliferation"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/204698","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=204698"}],"version-history":[{"count":14,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/204698\/revisions"}],"predecessor-version":[{"id":205023,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/204698\/revisions\/205023"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/200112"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=204698"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=204698"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=204698"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=204698"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}