Man
Professional
- Messages
- 3,087
- Reaction score
- 627
- Points
- 113
Our interviews are educational in nature and do not call for anything.
Information:
• Today's guest Creator of the LummaC2 stealer project
• Interviewer: xsd715
• Respondent: LummaC2
• Interview date: 10/26/2023
Me - Hi, introduce yourself!
G - Hello, I am a seller / support person for a product called LummaC2. We are one of the fastest growing MaaS projects on the market right now.
Me - How old are you? Where are you from? How long have you been working with Lumma? How did you come to this?
G - I'm in my thirties) We care about our own security, I can only say that our team is based in the CIS. We have been with the project since the first day of its foundation.
How did we come to create our own stealer?
From the very beginning, the idea was to make a unique malware - one that is not currently on the market. There is a lot of competition in this area, it's like a challenge. Some people jump from a parachute, and we jump into a niche with high competition, because the more healthy competition - the higher the level of service. And we are in pursuit of the best service.
Me - Wow, tough

Do you follow the news? The cops, as I heard, are looking for the creators of the famous stealers, redline, etc.? Are you afraid of such a fate?
G - I follow the news. We do not violate the laws of the countries where we live (our stealer simply does not snitch here). Also, as I wrote in the answer to the previous question - we have a very responsible approach to issues of anonymity and our own safety.
Am I afraid of such a fate?
I will answer with a quote from one of the most outstanding adventurers of our time, S. Mavrodi: "A person should not be afraid of anything. You need to hesitate when choosing a goal, when the goal is chosen - you just need to act."
Me - I like this approach

Did you have large customers, clients? Did you cooperate with the government? And what interesting clients have you worked with and can you tell us about them?
G - Our product is suitable for all types of traffic: there are clients who pour Google Ads / Bing / Facebook, do pinpoint attacks / corporate networks, spill exchanges, YT / Booking teams work with us, etc.
We have not cooperated with the state)
It is interesting to watch clients who work with a stealer for the first time and get their first profits. It is nice to see that people trust us.
I - Which stealer would you like to highlight from the crowd besides yours? Have competitors tried to annoy you? If so, how?
G - The malware market is large - many new projects appear, I can't single out anyone in particular, but I will say that each is good in its own way, and we welcome competition - it makes our service better.
They are constantly trying to annoy us, conducting DDoS attacks and reporting our domains. We successfully counteract such antics.
Me - By the way, such an interesting question.
How did you come to malware? What did you go through to get to this? Or did you know from childhood that you would work in this field? What pitfalls were there along the way?
G - I have been programming for over 15 years, I started coding back in my school years - I wrote websites and software to order. There was not much money to be made from this, so I decided to try myself in malware. I started learning low-level languages, found like-minded people on one of the forums to exchange some experience.
I wrote the first version of LummaC in a few days - I assembled a team of traffickers and began testing it in practice. LummaC was raw, the attempt to open sales was unsuccessful, and I decided to finalize the software.
I worked on the second version LummaC2 for over six months. The software was written entirely in C/ASM, I managed to implement havens gate technology into it - bypassing proactive protection - direct call of syscalls, there is no API below this, thanks to it the build lives and the crypt lasts longer. There was no such development and there is none to this day in anyone's stealers.
At first, there were difficulties with cleanings due to constant draining on VT build, then we got a binary morpher and cleanings became automatic + we implemented protection against spills without crypt, which significantly extended the life of our builds.
I am Top, years of hard work, and I think you are happy with the work done.

How much do you need for a comfortable life? What do you eat? Do you play sports?
G - Around $ 10,000 per month. I eat right, I try to take care of my health. Sports are also an important part of my life, I go to the gym 3-4 times a week.
Me - What is your attitude to alcohol, drugs, cigarettes? Do you cook yourself or does your girlfriend (wife)? Do your relatives and friends know about your activities?
G - I am neutral towards alcohol, negative towards everything else. My wife cooks, sometimes I go to cafes and restaurants - I love Pan-Asian cuisine. I do not talk about my activities, for my relatives and friends I am just an IT specialist-entrepreneur.

Me - What are your plans for the next 5 years? Do you have any projects in IRL? Businesses? Real estate? A car?
G -[/B] My plans include developing my product, reaching new levels in the field of malware and gathering an even larger community. I am interested in my business, and I spend almost all my time supporting my software - there is not enough time for other businesses when you are running such a large project. I will refrain from answering about this)
Me- Have they tried to scam, de-anonymize, matchmake? Have your competitors and maybe even friends tried to throw a spanner in the works? Has their attitude towards you changed after the money and projects appeared?
G - They tried to de-anonymize, but to no avail), I repeat that we are very meticulous about our own security and anonymity. As for competitors, as I wrote above - they threw a spanner in the works with DDoS attacks, domain reports and leaking builds on VT, there were also false articles ("dumps") about our product. I have
less real life experience for her, unfortunately, - I simply don't have enough time even for a meeting. But despite this, I have found many reliable people online.
Me - What do you think about today's youth (14 and up)? What advice would you give? What life experience would you like to share with our readers?
G - Today's youth will most likely be the most innovative in history. This is the first generation to grow up in a digital society with unlimited access to information.
Never put off until tomorrow what you can do today.
Be responsible for what you do and strive to do something new, different from others. Be a reliable partner.
I believe that if you put all these factors together and work hard, then any activity will bear fruit.
Me - How do you maintain your anonymity on the Internet? By the way, how do you dress? What is your setup? What accessories do you have (PC, phone, headphones, watch, jewelry)?
G - About anonymity: I completely exclude social networks due to the possibility of deanonymization, I do my work only from a remote machine with a safe OS and traffic, I learn from the "mistakes" in existing cases and do not use unsafe messengers to communicate with the team.
I wear simple clothes, but I believe that the most important attribute of a man is a watch and shoes. Favorite shoe brand is Loro Piana, and my favorite watch brand is Omega.
When traveling, I use an MSI Titan laptop, for home I assembled a PC with similar characteristics, and for phones and other things, I use Chinese ones)
Me - What do you spend your income on? Is there anything else you are interested in that you would like to start? Have you ever thought about switching to another topic, like hacking, etc.?
G - I spend my income in the same way as most people. I invest part of it in the project. I would like to try my hand at snowboarding, but I can’t find the time) I haven’t thought about switching to another topic, since I already have a main project and spend all my time on it.
Me - Do you watch movies, TV series, anime? If so, which ones? What genres do you like?
G - I watch movies, but very rarely. Mostly documentaries, I like them when they are based on real events.
Me- Do you read books? If so, which ones? Can you give me one book on your topic of work and one that you really like?
G - I am fond of poetry, you can find out your favorite poet in the article about us - https://www.silentpush.com/blog/lummac2?format=amp .
For readers, I can highlight one interesting book on cybersecurity - "Secrets and Lies. Data Security in the Digital World" (Bruce Schneier).
Favorite book - "Do No Harm"
by Henry Marsh.
Me - And a couple of last questions. Although I don't want to finish the interview, since you are a very useful and experienced person)
How do you feel about TalkTheScam? And will you show your crypto wallet?
G - I have a positive attitude. I read several interviews - quite interesting, I have not seen anything like this anywhere else.
Me - And finally.
What are you leaving with? Who would you say hello to? What is your strength?
G - Thank you for the interview!
I say hello to everyone who reads this interview, I hope you enjoy it.
If any of the readers are interested in the topic of working with a stealer, our doors are open.
Strength is in knowledge

As for me, the interview turned out to be very interesting. If you liked it, put likes and reactions.