Skip to main content

FAKE TELEGRAM PREMIUM SITE DISTRIBUTES NEW LUMMA STEALER VARIANT

Medium
Published: Sun Aug 03 2025 (08/03/2025, 04:27:08 UTC)
Source: AlienVault OTX General

Description

A malicious campaign using the domain 'telegrampremium[.]app' is distributing a new variant of Lumma Stealer malware. The fake site mimics the official Telegram Premium platform and automatically downloads an executable file 'start.exe' upon access. This sophisticated information-stealing trojan can exfiltrate browser credentials, cryptocurrency wallet details, and system information. The malware employs various techniques for persistence, defense evasion, and data theft, including file system manipulation, registry modification, and clipboard operations. The campaign highlights the ongoing use of brand impersonation and social engineering for large-scale malware distribution, emphasizing the need for robust security measures and user awareness.

AI-Powered Analysis

AILast updated: 08/04/2025, 09:17:47 UTC

Technical Analysis

This threat involves a malicious campaign leveraging a fake website impersonating the official Telegram Premium platform, hosted at the domain 'telegrampremium.app'. Upon visiting the site, users are subjected to a drive-by download of an executable file named 'start.exe', which is a new variant of the Lumma Stealer malware. Lumma Stealer is an information-stealing trojan designed primarily for Windows systems. This malware is capable of exfiltrating sensitive data such as browser credentials, cryptocurrency wallet information, and detailed system information. The malware employs multiple advanced techniques to maintain persistence on infected systems, evade detection, and facilitate data theft. These techniques include manipulation of the file system, modification of Windows registry keys, clipboard data interception, and potentially process injection or obfuscation methods as indicated by the MITRE ATT&CK tags (e.g., T1055 - Process Injection, T1027 - Obfuscated Files or Information). The campaign exploits brand impersonation and social engineering tactics to lure victims into downloading the malware, highlighting the ongoing threat posed by fake websites mimicking trusted brands. Indicators of compromise include multiple file hashes, suspicious domains, and an IP address linked to the campaign. Although no known exploits in the wild are reported, the malware’s capability to steal credentials and cryptocurrency wallets poses a significant risk to affected users and organizations. The campaign underscores the importance of vigilance against phishing and drive-by download attacks, especially those exploiting popular platforms like Telegram.

Potential Impact

For European organizations, this threat poses a medium to high risk primarily due to the potential compromise of user credentials and sensitive financial information, including cryptocurrency wallets. Credential theft can lead to unauthorized access to corporate accounts, email systems, and internal resources, potentially resulting in data breaches, financial fraud, or lateral movement within networks. The malware’s ability to persist and evade detection increases the likelihood of prolonged compromise, which can exacerbate damage. Organizations with employees or customers who use Telegram Premium or related services are particularly vulnerable to social engineering attacks leveraging this fake site. The theft of browser credentials may also expose access to other corporate web services, increasing the attack surface. Additionally, the exfiltration of system information could aid attackers in tailoring further attacks or exploiting other vulnerabilities. The campaign’s use of drive-by downloads means that even a single visit to the malicious site can result in infection, increasing the risk of widespread impact if the domain is accessed from corporate networks. Given the increasing adoption of cryptocurrencies in Europe, theft of wallet credentials could lead to direct financial losses. Overall, this threat could disrupt business operations, compromise sensitive data, and cause reputational damage to affected organizations.

Mitigation Recommendations

1. Implement robust web filtering solutions to block access to known malicious domains such as 'telegrampremium.app' and the associated suspicious domains listed in the indicators. 2. Deploy endpoint detection and response (EDR) tools capable of identifying and blocking information-stealing malware behaviors, including file system manipulation, registry changes, and clipboard monitoring. 3. Enforce strict application whitelisting policies to prevent unauthorized execution of unknown executables like 'start.exe'. 4. Conduct targeted user awareness training focusing on the risks of brand impersonation, phishing, and drive-by downloads, emphasizing verification of URLs and the dangers of downloading executables from untrusted sources. 5. Regularly audit and monitor browser credential stores and cryptocurrency wallet applications for unauthorized access or anomalies. 6. Utilize multi-factor authentication (MFA) across all critical systems to mitigate the impact of credential theft. 7. Maintain up-to-date threat intelligence feeds and integrate them with security controls to promptly block emerging indicators of compromise. 8. Monitor network traffic for unusual outbound connections, especially to the IP address 87.120.126.213 and the domains listed, to detect potential data exfiltration attempts. 9. Implement strict privilege management to limit the ability of malware to modify registry keys or system files. 10. Encourage the use of hardware wallets or secure wallet management practices to reduce the risk of cryptocurrency theft.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.cyfirma.com/research/fake-telegram-premium-site-distributes-new-lumma-stealer-variant"]
Adversary
null
Pulse Id
688ee51c244879cbcd8b5826
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash86170725074de3b8edcd7671afa9b69d
hash0736ccd4920e227ebae3b0ded4950c01f663af6a
hash1f6ed1d5980390406d7d9e7aea1c18901468ef6c
hash3921ba3ad9ace63827a8ad2d70c1c4a79d462f24
hash7a77f579c6a4bda83d659be4e39ddfd7b7e2f73c
hash888e33a919d5dda152a539aed3f5a3b7840937bc
hash8c893331a5e01e0c99a7ad0f7f1cbb9418a86d4a
hash9a5f72502fd9be56226716e6435888a43ff43154
hashfc0e3ff066427316bcb001d05b3ac5692093d6a3
hashb97dcfb5161a59bd88fd821542e9d066c77c4ad49f09c81f472b26a5339f44f2
hashb0c2e0c4c18fec17f301011c17ca6f391179c488

Ip

ValueDescriptionCopy
ip87.120.126.213

Domain

ValueDescriptionCopy
domainannwt.xyz
domaincidtfhh.shop
domaindaruubs.top
domainfurwmsx.shop
domaingreqjfu.xyz
domainprvqhm.shop
domainrayrhs.top
domainteijx.lat
domainungryo.shop

Threat ID: 6890772bad5a09ad00df9c08

Added to database: 8/4/2025, 9:02:35 AM

Last enriched: 8/4/2025, 9:17:47 AM

Last updated: 8/4/2025, 10:08:37 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats