Monday, February 24, 2025
Homecyber securityCybercriminals Impersonate Windows "Commander Tool" to Launch LummaC2 Malware Attack

Cybercriminals Impersonate Windows “Commander Tool” to Launch LummaC2 Malware Attack

Published on

SIEM as a Service

Follow Us on Google News

The AhnLab Security Intelligence Center (ASEC) has uncovered a new cyberattack campaign leveraging the LummaC2 malware, which is being distributed under the guise of a cracked version of Total Commander.

Total Commander is a widely used Windows file management tool offering features like advanced search, folder synchronization, and FTP/SFTP support.

While the legitimate software provides a one-month free trial before requiring a paid license, threat actors have exploited its popularity by targeting users seeking illegal, cracked versions of the tool.

The attack begins when users search for “Total Commander Crack” online.

Among the search results, they encounter posts containing links to download the supposed crack.

These links redirect users through multiple pages, including Google Colab drives and disguised Reddit posts, before leading to the final download page.

This multi-step process is not automated but requires users to manually click through links, indicating that the attack specifically targets individuals attempting to obtain pirated software.

Sophisticated Malware Delivery Mechanism

The downloaded file is a password-protected ZIP archive containing a double-compressed RAR file.

Inside it is an executable named “installer_1.05_38.2.exe,” which infects the system with LummaC2 upon execution.

The malware employs advanced obfuscation techniques, including multiple layers of compression using NSIS and AutoIt scripts.

When executed, the NSIS script uses the ExecShell command to run an obfuscated batch script (Nv.cmd).

This script employs techniques such as inserting variables into commands and adding meaningless strings to hinder analysis.

Once deobfuscated, it becomes clear that the script executes an AutoIt-based payload.

The AutoIt script includes both an encrypted LummaC2 binary and the shellcode required to decrypt and load it into memory at runtime.

LummaC2 Malware
Divided binary file

This method of embedding malware within AutoIt scripts is a common tactic among cybercriminals.

LummaC2: A Persistent Information-Stealing Threat

LummaC2 is an information-stealing malware that has been active since early 2023.

It primarily targets users through illegal software downloads, such as cracks or serial generators.

Once installed on a victim’s system, LummaC2 exfiltrates sensitive data, including browser-stored credentials, email accounts, cryptocurrency wallet keys, and auto-login details for various programs.

The stolen data is sent to command-and-control (C&C) servers operated by threat actors and may subsequently be sold on dark web marketplaces or used for secondary attacks.

ASEC Reports indicate that personal data breaches caused by LummaC2 infections have led to corporate network compromises in some cases, amplifying its potential impact.

To mitigate the risks associated with this malware campaign, users are strongly advised to download software only from official sources and avoid pirated or cracked versions of applications.

Organizations should also implement robust endpoint security measures to detect and block malicious scripts and executables.

Free Webinar: Better SOC with Interactive Malware Sandbox for Incident Response, and Threat Hunting - Register Here

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

GitVenom Campaign Abuses Thousands of GitHub Repositories to Infect Users

The GitVenom campaign, a sophisticated cyber threat, has been exploiting GitHub repositories to spread...

UAC-0212: Hackers Unleash Devastating Cyber Assault on Critical Infrastructure

In a recent escalation of cyber threats, hackers have launched a targeted campaign, identified...

Widespread Chrome Malware: 16 Extensions Infect Over 3.2 Million Users

A recent cybersecurity investigation has uncovered a cluster of 16 malicious Chrome extensions that...

Sliver C2 Server Vulnerability Enables TCP Hijacking for Traffic Interception

A significant vulnerability has been discovered in the Sliver C2 server, a popular open-source...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

GitVenom Campaign Abuses Thousands of GitHub Repositories to Infect Users

The GitVenom campaign, a sophisticated cyber threat, has been exploiting GitHub repositories to spread...

UAC-0212: Hackers Unleash Devastating Cyber Assault on Critical Infrastructure

In a recent escalation of cyber threats, hackers have launched a targeted campaign, identified...

Widespread Chrome Malware: 16 Extensions Infect Over 3.2 Million Users

A recent cybersecurity investigation has uncovered a cluster of 16 malicious Chrome extensions that...