Lumma Stealer v4: Indirect Syscalls & Anti-Sandbox
PUBLISHED: MAR 24, 2026
Executive Summary
Lumma Stealer (LummaC2) remains one of the most prolific infostealers in the current threat landscape. This variant (v4.0) demonstrates a significant shift in evasion tactics, moving away from standard Windows API hooks toward the manual implementation of Indirect Syscalls. By bypassing the user-mode hooks typically monitored by EDR solutions, Lumma is able to perform stealthy process injection and credential harvesting.
Technical Deep Dive
[ Pending — analysis in progress ]
Behavioral Analysis
[ Pending — dynamic analysis in progress ]
Network Traffic
[ Pending — C2 traffic capture and Wireshark analysis in progress ]
YARA Rule
[ Pending — signature development in progress ]
Indicators of Compromise (IOCs)
SHA256: 69e1c6e6db92779a952338294a7c75782c9ad2c48b57289252e3f5287d1c5bd5
C2: collection-services[.]net
C2: update-check-v4[.]ru