

Обновление 18.09 RU
1. Добавлен новый метод сбора куков Chrome, новому методу не требуются права администратора и/или перезапуск, что упростит крипт билда и уменьшит шанс детекта, а значит повысит отстук
2. Добавлен сбор куков из инкогнито вкладок (если они открыты)
3. Чистка Windows Defender 10/11 + Cloud
4. Исправлена ошибка при возвращении в меню когда найдено 0 логов
5. Поиск ускорен в 4 раза
6. Добавлено сообщение о загрузке логов в маркете
7. Улучшен поиск в панели
Update 18.09 EN
1. Added a new method of collecting Chrome cookies, the new method does not require admin rights and/or restart, which will simplify the crypt build and reduce the chance of detection, and thus increase the knock rate
2. Added collection of cookies from incognito tabs (if they are open)
3. Cleaned Windows Defender 10/11 + Cloud
4. Fixed bug when returning to menu when 0 logs are found
5. Search accelerated 4 times
6. Added message about downloading logs in the marketplace
7. Improved search in the panel

Full description of LummaC2

LummaC2 is a stealer that has no analogues, the average knockback is 75-85%, it works even on clean systems, there are no dependencies (AT ALL), log decryption on the server, the build weight is 150-300 KB, it steals browsers based on Chromium and Mozilla , steals ~70 browser cryptocurrency and 2FA extensions, Discord tokens, it is possible to RESTORE KILLED GOOGLE COOKIES , non-resident Loader , low-level adaptive file grabber, integrated Reverse proxy , lnk builder, AI for detecting bots in the panel, as well as the latest unique development – MORPHER. LummaC2 is updated literally every two hours, add your specific browser or your specific extension – 2 clicks!
Important information about our product:
- The language used in the development of this product is C++
- High-level WinAPI is hardly used
- We work on the Malware-as-a-Service model, the panel and builder are located on the web
- All decryption is completely server-based, all data transmitted by the stealer is decrypted on the server
- In order to increase the response time, data is sent in chunks.
- The build weight is 150-300KB
- A neighbor detection system is available, as well as a traffic quality monitoring system.
- System calls support ARM, x86, x64 architectures
- Stiller works on operating system versions starting from Windows 7 x32, ending with Windows 11 x64 with the latest updates
- All interaction with the OS occurs through calls to a low-level wrapper written in ASM over system calls, no WinAPI, only manual syscall calls (corporate rate)
- Where WinAPI is used, its calls are encrypted (custom GetProcAddress)
- Heavens Gate technology implemented (corporate tariff)
- Implemented protection against leakage without crypt (to disable signature blurring must be more than 10%)
- There is a proprietary morpher that is used in the builder.
- There is a non-resident Loader , capable of loading .exe / .dll / .ps1 via direct link
- Implemented Google Account cookie recovery directly in the panel using a token and proxy (http / socks5)
- A filter function is available that allows you to define logs with your own queries
- Google Account and CC tokens are being collected, DomainDetect is available in log format
- API available for team work
- Implemented sorting of logs in the panel by country, wallets, build tag and filters, and search by cookies / passwords is also available
- Integrated Reverse Proxy from our partner GhostSocks directly into the panel
- Implemented rotation of pads, 1+10 backup addresses + Steam pad are sewn into the build, it is possible to connect a personal pad to improve the knock
- There is own lnk builder

Log format

You must be logged in to post a comment.