Post

Incident Response: LummaStealer Alert Triage

Incident Response: LummaStealer Alert Triage

An alert pings at a Security Operations Center (SOC) and I find a signature hit for ET MALWARE Lumma Stealer Victim Fingerprinting Activity that triggered on traffic from 153[.]92[.]1[.]49 over TCP port 80. The alert triggered on 2026-01-27 at 23:05 UTC. Using the information, I retrieve a packet capture (pcap) of the traffic and perform and indepth analysis using Brim to determine whether it is a true positive or a false positive

Executive Summary

During a routine traffic analysis using Brim/Zui, a high-volume connection anomaly was detected originating from an internal workstation.Investigation revealed communication with a known LummaC2 domain. No physical files were found on the host,suggesting a fileless execution method.

Victim Host Information

AttributeDetailEvidence Source
Source IP10[.]1[.]21[.]58conn log
MAC Address00:21:5d:c8:0e:f2dhcp log
HostnameDESKTOP-ES9F3MLdhcp log
Usernamegwyattkerberos log

User enumeration was done as below

dhcp index

kerberos index

Technical findings & Proof of Concept

Traffic Anomaly

Filtering the conn log using the victim ip as the source shows a high count which probed me to look into the destination ip count aswell and the ip from the alert stands out.

conn index

conn2 index

C2 Domain Identification

Analysis of the http path on Brim unravels more information.Using the destination ip address we aim to find the domain name associated with it.

http index

Looking up the domain on VirusTotal we find it has a high detection rate and is a known malicious Command & Control server.

virustotal index

virustotal2 index

The connection metadata correlates in that lumma uses specific patterns like /api and a beaconing where the same connection spawns every 60 seconds.

api index

Fileless Indicators

Despite the high network activity,files path returned zero entries for the timeframe excluding the benign activities which indicates the paylaod was executed in-memory using living-off-the-land techniques.

fileless index

Threat Intelligence Enrichment

Based on publicly available threat intelligence from MITRE ATT&CK FRAMEWORK and looking at our Indicators of Compromise we have enough to make a decision.

threat index

threat2 index

Indicators of Compromise

  • IoC :whitepepper.su
  • IoC type : domain
  • Ip_address : 153[.]92[.]1[.]49
  • Malware family : Lummar Stealer
  • Confidence level : 100%

Conclusion & Escalation

Disposition: True Positive

The activity is consistent with a successful malware infection Due to the nature of infostealers,all credentials associated with the user gwyatt should be considered compromised.

Recommended host isolation

Escalated to Tier 2 Incident Response for memory forensics

This post is licensed under CC BY 4.0 by the author.