A sophisticated information-stealing campaign is actively distributing the LummaStealer malware by targeting users searching for the YubiKey Manager software. The attack leverages SEO poisoning to direct victims to a malicious download site, initiating a complex, multi-stage infection chain designed to evade detection and maximize data theft. Key tactics include DLL Sideloading, in-memory payload execution via Process Hollowing, and privilege escalation to SYSTEM level. The ultimate goal is the widespread theft of sensitive credentials from browsers, FTP clients, and password managers, alongside the establishment of persistent backdoors for long-term access. This campaign represents a significant threat due to its advanced evasion techniques and the broad scope of targeted data.
The attack begins when a user searches for legitimate software, in this case, YubiKey Manager. Through SEO poisoning, attackers manipulate search engine results to promote their malicious download site, yubico-app.com. A user downloading from this site receives a malicious ISO image. Mounting and executing the contained YUBICO_SETUP.EXE triggers the primary infection.
The executable is vulnerable to DLL sideloading and loads a malicious PYTHON311.DLL placed alongside it. This DLL acts as the initial dropper and orchestrator. It first uses a Base64-encoded PowerShell command to add exclusions for .exe, .com, and the Temp directory in Windows Defender, effectively blinding the default antivirus. Subsequently, it drops and executes a file named Health.exe, which is a disguised AutoIt interpreter. This interpreter runs an obfuscated script that unpacks and injects the final C++/Qt LummaStealer payload into memory using process hollowing, a technique that helps evade file-based detection signatures.
The attack chain demonstrates a deep understanding of offensive security techniques aimed at bypassing modern defenses. Attribution to LummaStealer is confirmed by the use of AutoIt scripts, .TOP C2 domains, specific sandbox evasion checks (for hostnames test22, NfZtFbPfH, ELICZ), and the creation of a scheduled task named NeuraLogix.
https[:]//yubico-app[.]com/yubikey-manager[.]php (T1566.001 - Phishing: Spearphishing Link).YUBICO_SETUP.EXE (T1204.002 - User Execution: Malicious File).YUBICO_SETUP.EXE loads the malicious PYTHON311.DLL from the same directory (T1574.002 - Hijack Execution Flow: DLL Sideloading).T1562.001 - Impair Defenses: Disable or Modify Tools).Health.exe) uses RC4 and LZNT1 decompression to unpack the final payload. It then uses Process Hollowing (T1055.012) to inject the LummaStealer DLL into a new process, avoiding writing the final payload to disk.grab::GetLocalSystemProcessToken to duplicate the access token from the winlogon.exe process, escalating its privileges to SYSTEM (T1134.002 - Access Token Manipulation: Create Process with Token). This elevated access is crucial for decrypting app-bound keys.T1555.003 - Credentials from Password Stores: Credentials from Web Browsers), targeting:.zip file and exfiltrated via an HTTP POST request to the C2 server, Verifydl.top, using a spoofed Firefox User-Agent (T1041 - Exfiltration Over C2 Channel).rdpwrap.dll (T1021.001 - Remote Services: Remote Desktop Protocol).NeuraLogix created via COM interfaces to evade simple detection (T1053.005 - Scheduled Task/Job: Scheduled Task).RunOnce registry key for a secondary payload (T1547.001 - Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder).RunOnce registry key named wextract_cleanup0 is used to delete temporary files upon the next user logon, hindering forensic analysis.The primary impact is the large-scale theft of sensitive credentials, which can lead to financial fraud, identity theft, and unauthorized access to personal and corporate accounts. The theft of FTP, SSH, and password manager credentials poses a severe risk, as these can be used to pivot into corporate networks, access development infrastructure, or compromise other high-value assets. The installation of persistent backdoors like RDP and reverse tunnels transforms the initial credential theft into a long-term compromise, allowing attackers to maintain access, deploy additional malware (such as ransomware), and conduct further reconnaissance within the victim's network.
e70d3ebc928d2c199d7a62b130421c398b2dc89db48645585d67927b471912c4PYTHON311.DLL)bcd08a8a103088ba2451a3a547725285a78894d71769494245c0aadf37e2e431f27f4ef8-e729-4b5d-b095-2a405cb3380d.exe)Verifydl.topyubico-app.comhttps://yubico-app.com/yubikey-manager.phpSecurity teams may want to hunt for the following patterns, which could indicate related activity:
Health.exeYUBICO_SETUP.EXEpowershell.exe.powershell.exe -encHKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOncewextract_cleanup0.NeuraLogix*.top.top TLDs from non-browser processes.PYTHON311.DLLYUBICO_SETUP.EXE or other legitimate executables.Effective detection requires a multi-layered approach focusing on behaviors rather than static signatures.
T1574.002) and Process Hollowing (T1055.012). EDR rules should alert on YUBICO_SETUP.EXE (or other legitimate software) spawning powershell.exe or making outbound network connections. For detection, consider implementing D3FEND's Process Analysis..top. Inspect HTTP/S traffic for connections matching the C2 domains. D3FEND's Network Traffic Analysis is a key defensive technique here.M1017): Educate users about the risks of SEO poisoning and the importance of downloading software only from official vendor websites. Verify URLs before clicking.M1038): Implement application allowlisting policies to prevent the execution of unauthorized software like Health.exe. This is a powerful defense against multi-stage malware. This can be mapped to D3FEND's Executable Allowlisting.M1049): Ensure antivirus and EDR solutions are enabled and configured to detect behavioral patterns, not just file signatures. Enable attack surface reduction (ASR) rules to block obfuscated scripts and suspicious process behaviors.M1032): Enforce MFA on all external and critical internal services to mitigate the impact of stolen credentials.User searches for YubiKey Manager and is led to a malicious site via SEO poisoning.
User downloads and mounts a malicious ISO file, executing 'YUBICO_SETUP.EXE'.
The executable sideloads a malicious 'PYTHON311.DLL'.
PowerShell is launched to add Windows Defender exclusions for '.exe', '.com', and the Temp directory.
The masqueraded AutoIt interpreter 'Health.exe' is dropped and executed.
The AutoIt script unpacks and injects the LummaStealer payload into memory using Process Hollowing.
LummaStealer duplicates the winlogon token to gain SYSTEM privileges.
The malware steals credentials from browsers, FTP clients, and KeePass, then takes a screenshot.
Stolen data is archived and exfiltrated via HTTP POST to the C2 server 'verifydl.top'.
Persistence is established via a RunOnce registry key and a scheduled task named 'NeuraLogix'.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats