Lumma Stealer - A tale that starts with a fake Captcha - Vital Digital Forensics By admin Published: 2025-03-14 · Archived: 2026-04-05 13:19:32 UTC V4ensics has observed multiple malware campaigns, which start with a fake Captcha page. The victim visits this page either by visiting a spear-phishing link or just, as seen recently in multiple occasions, through a seemingly benigh advertisement / popup in a site, which hosts pirated content (movies and tv series).  In the fake Captcha page, which the present article analyzes, v4ensics was called to investigate the case of a user, who visited a popular site, which hosted pirated movies and tv series. The user was bombarded with multiple popups, presenting him with seemingly benign advertisements. One of these advertisements constituted the first stage of a Lumma Stealer campaign, which by, inadvertently to the user, going through multiple stages, started with the simple advertisement and could end up with the victim being infected by one of the most notorious infostealers in the wild, Lumma Stealer, unless something went wrong in the process (e.g. a security solution blocked one of the campaign stages making it in this way impossible for the final campaign payload to be executed). While visiting the "original" site (in the examined case site with the pirated content) the victim is directed to another page (hxxps://gubanompostra[.]fly[.]storage[.]tigris[.]dev/emogaping-gotten-into-gubano.html), which consists of a fake captcha verification box. The page asks the intended victim to perform specific actions, which end up with the victim running a malicious command through a Windows OS run.exe prompt, so that the victim is verified as Human. https://v4ensics.gr/lumma-stealer-a-tale-that-starts-with-a-fake-captcha/ Page 1 of 23 The command, which is initially copied to the victim's clipboard is a Powershell command that uses Windows Common Information Model (CIM) to spawn a malicious mshta.exe process. The latter is used to parse and execute the code of an .hta file (Windows HTML Application) located at hxxps[://]iankaxo[.]xyz/mikona-guba[.]m4a. The file mikona-guba.mp4, which is in fact a malicious .hta file, is highly obfuscated. The file begins with an alphanumeric string, followed by seemingly “junk” bytes. A part of the alphanumeric string is displayed in the first of the following two images, while the second one, a portion of which is depicted in the second image, contains seemingly “junk” bytes. https://v4ensics.gr/lumma-stealer-a-tale-that-starts-with-a-fake-captcha/ Page 2 of 23 Analyzing the seemingly "junk" bytes, a couple