Wednesday, April 16, 2025
Homecyber securityCybercriminals Impersonate Windows "Commander Tool" to Launch LummaC2 Malware Attack

Cybercriminals Impersonate Windows “Commander Tool” to Launch LummaC2 Malware Attack

Published on

SIEM as a Service

Follow Us on Google News

The AhnLab Security Intelligence Center (ASEC) has uncovered a new cyberattack campaign leveraging the LummaC2 malware, which is being distributed under the guise of a cracked version of Total Commander.

Total Commander is a widely used Windows file management tool offering features like advanced search, folder synchronization, and FTP/SFTP support.

While the legitimate software provides a one-month free trial before requiring a paid license, threat actors have exploited its popularity by targeting users seeking illegal, cracked versions of the tool.

- Advertisement - Google News

The attack begins when users search for “Total Commander Crack” online.

Among the search results, they encounter posts containing links to download the supposed crack.

These links redirect users through multiple pages, including Google Colab drives and disguised Reddit posts, before leading to the final download page.

This multi-step process is not automated but requires users to manually click through links, indicating that the attack specifically targets individuals attempting to obtain pirated software.

Sophisticated Malware Delivery Mechanism

The downloaded file is a password-protected ZIP archive containing a double-compressed RAR file.

Inside it is an executable named “installer_1.05_38.2.exe,” which infects the system with LummaC2 upon execution.

The malware employs advanced obfuscation techniques, including multiple layers of compression using NSIS and AutoIt scripts.

When executed, the NSIS script uses the ExecShell command to run an obfuscated batch script (Nv.cmd).

This script employs techniques such as inserting variables into commands and adding meaningless strings to hinder analysis.

Once deobfuscated, it becomes clear that the script executes an AutoIt-based payload.

The AutoIt script includes both an encrypted LummaC2 binary and the shellcode required to decrypt and load it into memory at runtime.

LummaC2 Malware
Divided binary file

This method of embedding malware within AutoIt scripts is a common tactic among cybercriminals.

LummaC2: A Persistent Information-Stealing Threat

LummaC2 is an information-stealing malware that has been active since early 2023.

It primarily targets users through illegal software downloads, such as cracks or serial generators.

Once installed on a victim’s system, LummaC2 exfiltrates sensitive data, including browser-stored credentials, email accounts, cryptocurrency wallet keys, and auto-login details for various programs.

The stolen data is sent to command-and-control (C&C) servers operated by threat actors and may subsequently be sold on dark web marketplaces or used for secondary attacks.

ASEC Reports indicate that personal data breaches caused by LummaC2 infections have led to corporate network compromises in some cases, amplifying its potential impact.

To mitigate the risks associated with this malware campaign, users are strongly advised to download software only from official sources and avoid pirated or cracked versions of applications.

Organizations should also implement robust endpoint security measures to detect and block malicious scripts and executables.

Free Webinar: Better SOC with Interactive Malware Sandbox for Incident Response, and Threat Hunting - Register Here

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Landmark Admin Suffers Major Breach, Exposing Data of 1.6M+ Users

Landmark Admin, LLC (“Landmark”), a Texas-based third-party administrator for life insurance carriers, has confirmed...

SquareX to Reveal Critical Data Splicing Attack at BSides SF, Exposing Major DLP Vulnerability

SquareX researchers Jeswin Mathai and Audrey Adeline will be disclosing a new class of data exfiltration techniques at BSides...

Firefox Fixes High-Severity Vulnerability Causing Memory Corruption via Race Condition

Mozilla has released Firefox 137.0.2, addressing a high-severity security flaw that could potentially allow...

Tails 6.14.2 Released with Critical Fixes for Linux Kernel Vulnerabilities

The Tails Project has urgently released Tails 6.14.2, addressing critical security vulnerabilities in the Linux...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Landmark Admin Suffers Major Breach, Exposing Data of 1.6M+ Users

Landmark Admin, LLC (“Landmark”), a Texas-based third-party administrator for life insurance carriers, has confirmed...

SquareX to Reveal Critical Data Splicing Attack at BSides SF, Exposing Major DLP Vulnerability

SquareX researchers Jeswin Mathai and Audrey Adeline will be disclosing a new class of data exfiltration techniques at BSides...

Firefox Fixes High-Severity Vulnerability Causing Memory Corruption via Race Condition

Mozilla has released Firefox 137.0.2, addressing a high-severity security flaw that could potentially allow...