Monday, April 28, 2025
Homecyber securityCybercriminals Impersonate Windows "Commander Tool" to Launch LummaC2 Malware Attack

Cybercriminals Impersonate Windows “Commander Tool” to Launch LummaC2 Malware Attack

Published on

SIEM as a Service

Follow Us on Google News

The AhnLab Security Intelligence Center (ASEC) has uncovered a new cyberattack campaign leveraging the LummaC2 malware, which is being distributed under the guise of a cracked version of Total Commander.

Total Commander is a widely used Windows file management tool offering features like advanced search, folder synchronization, and FTP/SFTP support.

While the legitimate software provides a one-month free trial before requiring a paid license, threat actors have exploited its popularity by targeting users seeking illegal, cracked versions of the tool.

- Advertisement - Google News

The attack begins when users search for “Total Commander Crack” online.

Among the search results, they encounter posts containing links to download the supposed crack.

These links redirect users through multiple pages, including Google Colab drives and disguised Reddit posts, before leading to the final download page.

This multi-step process is not automated but requires users to manually click through links, indicating that the attack specifically targets individuals attempting to obtain pirated software.

Sophisticated Malware Delivery Mechanism

The downloaded file is a password-protected ZIP archive containing a double-compressed RAR file.

Inside it is an executable named “installer_1.05_38.2.exe,” which infects the system with LummaC2 upon execution.

The malware employs advanced obfuscation techniques, including multiple layers of compression using NSIS and AutoIt scripts.

When executed, the NSIS script uses the ExecShell command to run an obfuscated batch script (Nv.cmd).

This script employs techniques such as inserting variables into commands and adding meaningless strings to hinder analysis.

Once deobfuscated, it becomes clear that the script executes an AutoIt-based payload.

The AutoIt script includes both an encrypted LummaC2 binary and the shellcode required to decrypt and load it into memory at runtime.

LummaC2 Malware
Divided binary file

This method of embedding malware within AutoIt scripts is a common tactic among cybercriminals.

LummaC2: A Persistent Information-Stealing Threat

LummaC2 is an information-stealing malware that has been active since early 2023.

It primarily targets users through illegal software downloads, such as cracks or serial generators.

Once installed on a victim’s system, LummaC2 exfiltrates sensitive data, including browser-stored credentials, email accounts, cryptocurrency wallet keys, and auto-login details for various programs.

The stolen data is sent to command-and-control (C&C) servers operated by threat actors and may subsequently be sold on dark web marketplaces or used for secondary attacks.

ASEC Reports indicate that personal data breaches caused by LummaC2 infections have led to corporate network compromises in some cases, amplifying its potential impact.

To mitigate the risks associated with this malware campaign, users are strongly advised to download software only from official sources and avoid pirated or cracked versions of applications.

Organizations should also implement robust endpoint security measures to detect and block malicious scripts and executables.

Free Webinar: Better SOC with Interactive Malware Sandbox for Incident Response, and Threat Hunting - Register Here

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

China Claims U.S. Cyberattack Targeted Leading Encryption Company

China has accused U.S. intelligence agencies of carrying out a sophisticated cyberattack against one...

Critical FastCGI Library Flaw Exposes Embedded Devices to Code Execution

A severe vulnerability (CVE-2025-23016) in the FastCGI library-a core component of lightweight web server...

Viasat Modems Zero-Day Vulnerabilities Let Attackers Execute Remote Code

A severe zero-day vulnerability has been uncovered in multiple Viasat satellite modem models, including...

Obfuscation Techniques: A Key Weapon in the Ongoing War Between Hackers and Defenders

Obfuscation stands as a powerful weapon for attackers seeking to shield their malicious code...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

China Claims U.S. Cyberattack Targeted Leading Encryption Company

China has accused U.S. intelligence agencies of carrying out a sophisticated cyberattack against one...

Critical FastCGI Library Flaw Exposes Embedded Devices to Code Execution

A severe vulnerability (CVE-2025-23016) in the FastCGI library-a core component of lightweight web server...

Viasat Modems Zero-Day Vulnerabilities Let Attackers Execute Remote Code

A severe zero-day vulnerability has been uncovered in multiple Viasat satellite modem models, including...