Wednesday, March 12, 2025
No menu items!
HomeCyber SecurityCybercriminals Imitate Windows Commander Tool to Distribute LummaC2 Malware

Cybercriminals Imitate Windows Commander Tool to Distribute LummaC2 Malware

Threat Actors Use Fake Total Commander Cracks to Deploy LummaC2 Malware and Steal Sensitive Information

Security researchers at AhnLab Security Intelligence Center (ASEC) have uncovered a sophisticated malware campaign distributing the LummaC2 information stealer, disguised as a cracked version of Total Commander—a widely used file management tool for Windows.

The operation preys on users seeking unauthorized access to the software’s premium features, exploiting their tendency to download pirated copies from unverified sources. This campaign highlights the growing trend of cybercriminals weaponizing legitimate software tools to bypass user suspicion.

Total Commander, a dual-pane file manager with FTP support, encryption, and advanced search, operates on a freemium model, offering a 30-day trial before requiring a paid license. Despite its official availability at ghisler[.]com, attackers have created fake “cracked” versions containing malware.

ASEC’s investigation reveals that the attackers mimic Total Commander’s interface and version history to appear legitimate, further deceiving victims.

Multi-Stage Social Engineering Attack

The infection process begins when users search for “Total Commander Crack” on search engines like Google. They are led to a Google Colab page posing as a download portal.

Once on this page, victims must navigate through several redirects, including a fabricated Reddit thread, to reach the final download link. This multi-step process ensures that only users intentionally trying to download malicious files fall victim to the attack.

The downloaded file (installer_1.05_38.2.exe) is a double-compressed RAR archive protected by a password (“Schools”) to evade detection. After extraction, an NSIS installer script runs an obfuscated batch file (Nv.cmd), which deploys the LummaC2 payload.

The batch script checks for security tools like Avast, Sophos, and Bitdefender processes. If none are found, it decrypts and reassembles the LummaC2 components from fragmented binary blobs.

LummaC2 Malware and Data Theft

The final payload, embedded within an AutoIt script (.a3x), uses layered encryption to conceal its malicious code. LummaC2 is designed to exfiltrate sensitive data, including browser credentials, cryptocurrency wallets, and autofill information, which is sent to attacker-controlled servers (affordtempyo[.]biz, hoursuhouy[.]biz).

Campaign MD5 hashes associated with this attack include 0a2d4bbb5237add913a2c6cf24c08688 and 25728e657a3386c5bed9ae133613d660.

How to Defend Against This Threat

This campaign serves as a stark reminder of how cybercriminals exploit software piracy to deliver malware. Users are urged to avoid cracked software and only download tools from trusted, official vendors.

Enterprises should monitor network traffic for suspicious connections to domains like those listed in the Indicators of Compromise (IoCs). To mitigate the evolving risks of LummaC2, combining behavioral analytics with endpoint detection is essential for enhanced security.

Fintter Security
Fintter Securityhttps://fintter.com
I’m a cybersecurity expert focused on protecting digital infrastructures for fintech and enterprise businesses. I specialize in Open Source Intelligence (OSINT) and use social media insights to help drive business development while defending against cyber threats. I offer full security services, including firewall setup, endpoint protection, intrusion detection, and secure network configurations, ensuring your systems are secure, well-configured, and maintained. I’m available for consultancy and security services. Contact me at info@fintter.com or via WhatsApp at +2349114199908 to discuss how I can strengthen your organization’s cybersecurity and business growth.
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular

Recent Comments