Skip to content

S1213 Lumma Stealer

Lumma Stealer is an information stealer malware family in use since at least 2022. Lumma Stealer is a Malware as a Service (MaaS) where captured data has been sold in criminal markets to Initial Access Brokers.34521

Item Value
ID S1213
Associated Names LummaStealer
Type MALWARE
Version 1.0
Created 22 March 2025
Last Modified 22 March 2025
Navigation Layer View In ATT&CK® Navigator

Associated Software Descriptions

Name Description
LummaStealer 3

Techniques Used

Domain ID Name Use
enterprise T1071 Application Layer Protocol -
enterprise T1071.001 Web Protocols Lumma Stealer has used HTTP and HTTP for command and control communication.52
enterprise T1119 Automated Collection Lumma Stealer has automated collection of various information including cryptocurrency wallet details.3
enterprise T1547 Boot or Logon Autostart Execution -
enterprise T1547.001 Registry Run Keys / Startup Folder Lumma Stealer has created registry keys to maintain persistence using HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run.34
enterprise T1217 Browser Information Discovery Lumma Stealer has identified and gathered information from two-factor authentication extensions for multiple browsers.3
enterprise T1059 Command and Scripting Interpreter -
enterprise T1059.001 PowerShell Lumma Stealer has used PowerShell for initial user execution and other fuctions.5342
enterprise T1059.006 Python Lumma Stealer has used malicious Python scripts to execute payloads.3
enterprise T1059.010 AutoHotKey & AutoIT Lumma Stealer has utilized AutoIt malware scripts and AutoIt executables.53
enterprise T1555 Credentials from Password Stores -
enterprise T1555.003 Credentials from Web Browsers Lumma Stealer has gathered credential and other information from multiple browsers.321
enterprise T1074 Data Staged -
enterprise T1074.001 Local Data Staging Lumma Stealer has configured a custom user data directory such as a folder within %USERPROFILE%\AppData\Roaming for staging data.1
enterprise T1622 Debugger Evasion Lumma Stealer has checked for debugger strings by invoking GetForegroundWindow and looks for strings containing “x32dbg”, “x64dbg”, “windbg”, “ollydbg”, “dnspy”, “immunity debugger”, “hyperdbg”, “debug”, “debugger”, “cheat engine”, “cheatengine” and “ida”.2
enterprise T1140 Deobfuscate/Decode Files or Information Lumma Stealer has used Base64-encoded content during execution, decoded via PowerShell.4
enterprise T1573 Encrypted Channel -
enterprise T1573.002 Asymmetric Cryptography Lumma Stealer has used HTTPS for command and control purposes.2
enterprise T1041 Exfiltration Over C2 Channel Lumma Stealer has exfiltrated collected data over existing HTTP and HTTPS C2 channels.52
enterprise T1564 Hide Artifacts -
enterprise T1564.003 Hidden Window Lumma Stealer has utilized the .NET ProcessStartInfo class features to prevent the process from creating a visible window through setting the CreateNoWindow setting to “True,” which allows the executed command or script to run without displaying a command prompt window.2
enterprise T1574 Hijack Execution Flow -
enterprise T1574.001 DLL Lumma Stealer has leveraged legitimate applications to then side-load malicious DLLs during execution.3
enterprise T1562 Impair Defenses -
enterprise T1562.001 Disable or Modify Tools Lumma Stealer has attempted to bypass Windows Antimalware Scan Interface (AMSI) by removing the string “AmsiScanBuffer” from the “clr.dll” module in memory to prevent it from being called.4
enterprise T1036 Masquerading -
enterprise T1036.008 Masquerade File Type Lumma Stealer has used payloads that resemble benign file extensions such as .mp3, .accdb, and .pub, though the files contained malicious JavaScript content.4
enterprise T1027 Obfuscated Files or Information Lumma Stealer has used SmartAssembly to obfuscate .NET payloads.2
enterprise T1027.013 Encrypted/Encoded File Lumma Stealer has used AES-encrypted payloads contained within PowerShell scripts.5
enterprise T1566 Phishing -
enterprise T1566.001 Spearphishing Attachment Lumma Stealer has been delivered through phishing emails with malicious attachments.3
enterprise T1566.002 Spearphishing Link Lumma Stealer has been delivered through phishing emails containing malicious links.3
enterprise T1055 Process Injection -
enterprise T1055.012 Process Hollowing Lumma Stealer has used process hollowing leveraging a legitimate program such as “BitLockerToGo.exe” to inject a malicious payload.5
enterprise T1620 Reflective Code Loading Lumma Stealer has used reflective loading techniques to load content into memory during execution.42
enterprise T1113 Screen Capture Lumma Stealer has taken screenshots of victim machines.3
enterprise T1518 Software Discovery -
enterprise T1518.001 Security Software Discovery Lumma Stealer has detected antivirus processes using commands such as “tasklist” and “findstr.”5
enterprise T1176 Software Extensions -
enterprise T1176.001 Browser Extensions Lumma Stealer has installed a malicious browser extension to target Google Chrome, Microsoft Edge, Opera and Brave browsers for the purpose of stealing data.3
enterprise T1539 Steal Web Session Cookie Lumma Stealer has harvested cookies from various browsers.321
enterprise T1553 Subvert Trust Controls -
enterprise T1553.002 Code Signing Lumma Stealer has used valid code signing digital certificates from ConsolHQ LTD and Verandah Green Limited to appear legitimate.1
enterprise T1195 Supply Chain Compromise Lumma Stealer has been delivered through cracked software downloads.321
enterprise T1218 System Binary Proxy Execution -
enterprise T1218.005 Mshta Lumma Stealer has used mshta.exe to execute additional content.54
enterprise T1218.015 Electron Applications Lumma Stealer as leveraged Electron Applications to disable GPU sandboxing to avoid detection by security software.1
enterprise T1082 System Information Discovery Lumma Stealer has gathered various system information from victim machines.321
enterprise T1204 User Execution Lumma Stealer has been distributed through a fake CAPTCHA that presents instructions to the victim to open Windows Run window (“Windows Button + R”) and paste clipboard contents (“CTRL + V”) and press “Enter” to execute a Base64-encoded PowerShell.534
enterprise T1204.002 Malicious File Lumma Stealer has gained initial execution through victims opening malicious executable files embedded in zip archives, and MSI files within RAR files.3
enterprise T1497 Virtualization/Sandbox Evasion -
enterprise T1497.001 System Checks Lumma Stealer has queried system resources on the victim device to identify if it is executing in a sandbox or virtualized environments, checking usernames, conducting WMI queries for system details, checking for files commonly found in virtualized environments, searching system services, and inspecting process names.2 Lumma Stealer has checked system GPU configurations for sandbox detection.1

References