Friday, May 9, 2025
Homecyber securityLummaStealer Exploits Windows Utility to Run Remote Code Disguised as .mp4 File

LummaStealer Exploits Windows Utility to Run Remote Code Disguised as .mp4 File

Published on

SIEM as a Service

Follow Us on Google News

The Cybereason Global Security Operations Center (GSOC) has shed light on the sophisticated tactics used by the LummaStealer malware to evade detection and execute malicious code.

Originally spotted in 2022, this Russian-developed malware-as-a-service (MaaS) has continuously evolved its evasion techniques to target Windows systems.

Advanced Evasion with mshta.exe

LummaStealer’s operators have introduced a new technique involving the exploitation of the Microsoft HTML Application Host (mshta.exe), a legitimate Windows utility, to execute remote code disguised as an innocuous .mp4 file.

- Advertisement - Google News

This approach leverages trusted system processes to deliver and execute malicious payloads stealthily.

The malware uses a fake CAPTCHA page to socially engineer users into copying and pasting a script into the Windows Run dialog box.

Here, mshta.exe facilitates the execution of HTML Applications (HTA) files, which are operated outside the browser’s security context, thus bypassing many security measures.

LummaStealer
 mshta

The payload, hosted remotely and disguised as an MP4 file, contains heavily obfuscated JavaScript code.

This code, when executed, triggers a series of deobfuscation steps. Initially, it involves a hex-encoded payload which, upon decoding, reveals a PowerShell script.

This script is then run using PowerShell with unrestricted execution policies, allowing for the deployment of subsequent stages of the malware.

In its latest variant, LummaStealer employs memory injection techniques to bypass Antimalware Scan Interface (AMSI).

It scans memory regions, locates the AMSI signature, and overwrites it with a null byte array to disable detection capabilities temporarily.

According to the Report, this step is crucial for executing potentially harmful scripts without triggering security alarms.

Darknet Marketplace and Monetization

The operators of LummaStealer have set up an internal marketplace on Telegram, leveraging a bot (@lu****bot) for automated transactions of stolen user data.

LummaStealer
powershell

This platform boasts features like a seller rating system, advanced search capabilities, and flexible pricing, making it a popular choice among cybercriminals.

The marketplace has seen a surge in activity, with logs traded ranging in price from $0.10 to as high as $1,000, indicating its extensive use for monetizing stolen data directly.

An analysis of the monthly updates for LummaStealer since its inception shows a significant shift in focus from development to monetization after the opening of their log market in August 2024.

This shift is characterized by fewer updates as the emphasis moved towards facilitating and enhancing the marketplace operations.

This detailed exposure of LummaStealer’s operations underlines the persistent evolution of cyber threats, necessitating constant vigilance and advanced security measures to protect against such sophisticated malware campaigns.

Indicators of Compromise (IOCs)

Below is a table of indicators of compromise shared by Cybereason to aid in the detection and prevention of LummaStealer infections:

IOCTypeDescription
klipderiq[.]shopDomainC2
check[.]qlkwr[.]comDomainC2
172[.]67[.]144[.]135IPC2
104[.]21[.]224IPC2
xian[.]klipderiq[.]shopDomainC2
simplerwebs[.]worldDomainC2

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Azure Storage Utility Vulnerability Allows Privilege Escalation to Root Access

A critical vulnerability discovered by Varonis Threat Labs has exposed users of Microsoft Azure’s...

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score...

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux,...

Cisco IOS Software SISF Vulnerability Could Enable Attackers to Launch DoS Attacks

Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Azure Storage Utility Vulnerability Allows Privilege Escalation to Root Access

A critical vulnerability discovered by Varonis Threat Labs has exposed users of Microsoft Azure’s...

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score...

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux,...