FAKE TELEGRAM PREMIUM SITE DISTRIBUTES NEW LUMMA STEALER VARIANT
A malicious campaign using the domain 'telegrampremium[.]app' is distributing a new variant of Lumma Stealer malware. The fake site mimics the official Telegram Premium platform and automatically downloads an executable file 'start.exe' upon access. This sophisticated information-stealing trojan can exfiltrate browser credentials, cryptocurrency wallet details, and system information. The malware employs various techniques for persistence, defense evasion, and data theft, including file system manipulation, registry modification, and clipboard operations. The campaign highlights the ongoing use of brand impersonation and social engineering for large-scale malware distribution, emphasizing the need for robust security measures and user awareness.
AI Analysis
Technical Summary
This threat involves a malicious campaign leveraging a fake website impersonating the official Telegram Premium platform, hosted at the domain 'telegrampremium.app'. Upon visiting the site, users are subjected to a drive-by download of an executable file named 'start.exe', which is a new variant of the Lumma Stealer malware. Lumma Stealer is an information-stealing trojan designed primarily for Windows systems. This malware is capable of exfiltrating sensitive data such as browser credentials, cryptocurrency wallet information, and detailed system information. The malware employs multiple advanced techniques to maintain persistence on infected systems, evade detection, and facilitate data theft. These techniques include manipulation of the file system, modification of Windows registry keys, clipboard data interception, and potentially process injection or obfuscation methods as indicated by the MITRE ATT&CK tags (e.g., T1055 - Process Injection, T1027 - Obfuscated Files or Information). The campaign exploits brand impersonation and social engineering tactics to lure victims into downloading the malware, highlighting the ongoing threat posed by fake websites mimicking trusted brands. Indicators of compromise include multiple file hashes, suspicious domains, and an IP address linked to the campaign. Although no known exploits in the wild are reported, the malware’s capability to steal credentials and cryptocurrency wallets poses a significant risk to affected users and organizations. The campaign underscores the importance of vigilance against phishing and drive-by download attacks, especially those exploiting popular platforms like Telegram.
Potential Impact
For European organizations, this threat poses a medium to high risk primarily due to the potential compromise of user credentials and sensitive financial information, including cryptocurrency wallets. Credential theft can lead to unauthorized access to corporate accounts, email systems, and internal resources, potentially resulting in data breaches, financial fraud, or lateral movement within networks. The malware’s ability to persist and evade detection increases the likelihood of prolonged compromise, which can exacerbate damage. Organizations with employees or customers who use Telegram Premium or related services are particularly vulnerable to social engineering attacks leveraging this fake site. The theft of browser credentials may also expose access to other corporate web services, increasing the attack surface. Additionally, the exfiltration of system information could aid attackers in tailoring further attacks or exploiting other vulnerabilities. The campaign’s use of drive-by downloads means that even a single visit to the malicious site can result in infection, increasing the risk of widespread impact if the domain is accessed from corporate networks. Given the increasing adoption of cryptocurrencies in Europe, theft of wallet credentials could lead to direct financial losses. Overall, this threat could disrupt business operations, compromise sensitive data, and cause reputational damage to affected organizations.
Mitigation Recommendations
1. Implement robust web filtering solutions to block access to known malicious domains such as 'telegrampremium.app' and the associated suspicious domains listed in the indicators. 2. Deploy endpoint detection and response (EDR) tools capable of identifying and blocking information-stealing malware behaviors, including file system manipulation, registry changes, and clipboard monitoring. 3. Enforce strict application whitelisting policies to prevent unauthorized execution of unknown executables like 'start.exe'. 4. Conduct targeted user awareness training focusing on the risks of brand impersonation, phishing, and drive-by downloads, emphasizing verification of URLs and the dangers of downloading executables from untrusted sources. 5. Regularly audit and monitor browser credential stores and cryptocurrency wallet applications for unauthorized access or anomalies. 6. Utilize multi-factor authentication (MFA) across all critical systems to mitigate the impact of credential theft. 7. Maintain up-to-date threat intelligence feeds and integrate them with security controls to promptly block emerging indicators of compromise. 8. Monitor network traffic for unusual outbound connections, especially to the IP address 87.120.126.213 and the domains listed, to detect potential data exfiltration attempts. 9. Implement strict privilege management to limit the ability of malware to modify registry keys or system files. 10. Encourage the use of hardware wallets or secure wallet management practices to reduce the risk of cryptocurrency theft.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
Indicators of Compromise
- hash: 86170725074de3b8edcd7671afa9b69d
- hash: 0736ccd4920e227ebae3b0ded4950c01f663af6a
- hash: 1f6ed1d5980390406d7d9e7aea1c18901468ef6c
- hash: 3921ba3ad9ace63827a8ad2d70c1c4a79d462f24
- hash: 7a77f579c6a4bda83d659be4e39ddfd7b7e2f73c
- hash: 888e33a919d5dda152a539aed3f5a3b7840937bc
- hash: 8c893331a5e01e0c99a7ad0f7f1cbb9418a86d4a
- hash: 9a5f72502fd9be56226716e6435888a43ff43154
- hash: fc0e3ff066427316bcb001d05b3ac5692093d6a3
- hash: b97dcfb5161a59bd88fd821542e9d066c77c4ad49f09c81f472b26a5339f44f2
- ip: 87.120.126.213
- hash: b0c2e0c4c18fec17f301011c17ca6f391179c488
- domain: annwt.xyz
- domain: cidtfhh.shop
- domain: daruubs.top
- domain: furwmsx.shop
- domain: greqjfu.xyz
- domain: prvqhm.shop
- domain: rayrhs.top
- domain: teijx.lat
- domain: ungryo.shop
FAKE TELEGRAM PREMIUM SITE DISTRIBUTES NEW LUMMA STEALER VARIANT
Description
A malicious campaign using the domain 'telegrampremium[.]app' is distributing a new variant of Lumma Stealer malware. The fake site mimics the official Telegram Premium platform and automatically downloads an executable file 'start.exe' upon access. This sophisticated information-stealing trojan can exfiltrate browser credentials, cryptocurrency wallet details, and system information. The malware employs various techniques for persistence, defense evasion, and data theft, including file system manipulation, registry modification, and clipboard operations. The campaign highlights the ongoing use of brand impersonation and social engineering for large-scale malware distribution, emphasizing the need for robust security measures and user awareness.
AI-Powered Analysis
Technical Analysis
This threat involves a malicious campaign leveraging a fake website impersonating the official Telegram Premium platform, hosted at the domain 'telegrampremium.app'. Upon visiting the site, users are subjected to a drive-by download of an executable file named 'start.exe', which is a new variant of the Lumma Stealer malware. Lumma Stealer is an information-stealing trojan designed primarily for Windows systems. This malware is capable of exfiltrating sensitive data such as browser credentials, cryptocurrency wallet information, and detailed system information. The malware employs multiple advanced techniques to maintain persistence on infected systems, evade detection, and facilitate data theft. These techniques include manipulation of the file system, modification of Windows registry keys, clipboard data interception, and potentially process injection or obfuscation methods as indicated by the MITRE ATT&CK tags (e.g., T1055 - Process Injection, T1027 - Obfuscated Files or Information). The campaign exploits brand impersonation and social engineering tactics to lure victims into downloading the malware, highlighting the ongoing threat posed by fake websites mimicking trusted brands. Indicators of compromise include multiple file hashes, suspicious domains, and an IP address linked to the campaign. Although no known exploits in the wild are reported, the malware’s capability to steal credentials and cryptocurrency wallets poses a significant risk to affected users and organizations. The campaign underscores the importance of vigilance against phishing and drive-by download attacks, especially those exploiting popular platforms like Telegram.
Potential Impact
For European organizations, this threat poses a medium to high risk primarily due to the potential compromise of user credentials and sensitive financial information, including cryptocurrency wallets. Credential theft can lead to unauthorized access to corporate accounts, email systems, and internal resources, potentially resulting in data breaches, financial fraud, or lateral movement within networks. The malware’s ability to persist and evade detection increases the likelihood of prolonged compromise, which can exacerbate damage. Organizations with employees or customers who use Telegram Premium or related services are particularly vulnerable to social engineering attacks leveraging this fake site. The theft of browser credentials may also expose access to other corporate web services, increasing the attack surface. Additionally, the exfiltration of system information could aid attackers in tailoring further attacks or exploiting other vulnerabilities. The campaign’s use of drive-by downloads means that even a single visit to the malicious site can result in infection, increasing the risk of widespread impact if the domain is accessed from corporate networks. Given the increasing adoption of cryptocurrencies in Europe, theft of wallet credentials could lead to direct financial losses. Overall, this threat could disrupt business operations, compromise sensitive data, and cause reputational damage to affected organizations.
Mitigation Recommendations
1. Implement robust web filtering solutions to block access to known malicious domains such as 'telegrampremium.app' and the associated suspicious domains listed in the indicators. 2. Deploy endpoint detection and response (EDR) tools capable of identifying and blocking information-stealing malware behaviors, including file system manipulation, registry changes, and clipboard monitoring. 3. Enforce strict application whitelisting policies to prevent unauthorized execution of unknown executables like 'start.exe'. 4. Conduct targeted user awareness training focusing on the risks of brand impersonation, phishing, and drive-by downloads, emphasizing verification of URLs and the dangers of downloading executables from untrusted sources. 5. Regularly audit and monitor browser credential stores and cryptocurrency wallet applications for unauthorized access or anomalies. 6. Utilize multi-factor authentication (MFA) across all critical systems to mitigate the impact of credential theft. 7. Maintain up-to-date threat intelligence feeds and integrate them with security controls to promptly block emerging indicators of compromise. 8. Monitor network traffic for unusual outbound connections, especially to the IP address 87.120.126.213 and the domains listed, to detect potential data exfiltration attempts. 9. Implement strict privilege management to limit the ability of malware to modify registry keys or system files. 10. Encourage the use of hardware wallets or secure wallet management practices to reduce the risk of cryptocurrency theft.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.cyfirma.com/research/fake-telegram-premium-site-distributes-new-lumma-stealer-variant"]
- Adversary
- null
- Pulse Id
- 688ee51c244879cbcd8b5826
- Threat Score
- null
Indicators of Compromise
Hash
Value | Description | Copy |
---|---|---|
hash86170725074de3b8edcd7671afa9b69d | — | |
hash0736ccd4920e227ebae3b0ded4950c01f663af6a | — | |
hash1f6ed1d5980390406d7d9e7aea1c18901468ef6c | — | |
hash3921ba3ad9ace63827a8ad2d70c1c4a79d462f24 | — | |
hash7a77f579c6a4bda83d659be4e39ddfd7b7e2f73c | — | |
hash888e33a919d5dda152a539aed3f5a3b7840937bc | — | |
hash8c893331a5e01e0c99a7ad0f7f1cbb9418a86d4a | — | |
hash9a5f72502fd9be56226716e6435888a43ff43154 | — | |
hashfc0e3ff066427316bcb001d05b3ac5692093d6a3 | — | |
hashb97dcfb5161a59bd88fd821542e9d066c77c4ad49f09c81f472b26a5339f44f2 | — | |
hashb0c2e0c4c18fec17f301011c17ca6f391179c488 | — |
Ip
Value | Description | Copy |
---|---|---|
ip87.120.126.213 | — |
Domain
Value | Description | Copy |
---|---|---|
domainannwt.xyz | — | |
domaincidtfhh.shop | — | |
domaindaruubs.top | — | |
domainfurwmsx.shop | — | |
domaingreqjfu.xyz | — | |
domainprvqhm.shop | — | |
domainrayrhs.top | — | |
domainteijx.lat | — | |
domainungryo.shop | — |
Threat ID: 6890772bad5a09ad00df9c08
Added to database: 8/4/2025, 9:02:35 AM
Last enriched: 8/4/2025, 9:17:47 AM
Last updated: 8/4/2025, 10:08:37 AM
Views: 4
Related Threats
Ghost in the Zip | New PXA Stealer and Its Telegram-Powered Ecosystem
MediumNew JSCEAL Malware Targets Millions via Fake Crypto App Ads
MediumActive Exploitation of SonicWall VPNs
MediumLegalPwn Attack Tricks Popular GenAI Tools Into Misclassifying Malware as Safe Code
MediumMicrosoft OAuth App Impersonation Campaign Leads to MFA Phishing
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.