Posts

Showing posts from April, 2026

Lumma Stealer infection analysis (from pcap)

Image
You know that Infostealers play a foundational role in the cybercrime ecosystem because they act as initial access and data collection engines . Instead of going straight for disruption, they quietly harvest credentials, session cookies, browser data, crypto wallets, and system fingerprints from large numbers of machines. This information is then monetized in underground markets, often bundled as “logs” and sold to other actors. The following diagram is an example of the interaction between Infostealer Actors and Ransomware-as-a-Service operators.  Analyzing Malware from the network perspective is always revealing. It looks like Lumma Stealer is living a second life with some recent breaches, including the Context.ai one . Let’s walk through a simple exercise: we will examine a Lumma Stealer infection chain and then analyze a corresponding malware PCAP sample (special thanks to malware-traffic-analysis.net ). This will allow us to observe its network communication patterns, yes, wi...