Lord777
Professional
- Messages
- 2,579
- Reaction score
- 1,478
- Points
- 113
The LummaC2 malware (also known as Lumma Stealer), which steals user data, has acquired new interesting features: to avoid the sandbox and extract confidential information from the host, the malware uses trigonometry.
According to researchers from Outpost24, the described method helps operators to freeze the activation of the malware until mouse activity is detected.
LummaC2, written in C, is being sold on cybercriminal forums from December 2022. The authors of the Trojan periodically expand its functionality. Developers pay special attention to antianalysis methods.
The current version of LummaC2, now numbered v4. 0, requires operators to use a cryptor as an additional concealment measure. This helps fight malware code leaks.
In addition, the new sample demonstrated the use of trigonometry to detect human activity on the attacked host.
"The new technique used by the malware relies on the position of the mouse cursor, which is calculated in a short period of time — this helps to detect human activity. Thanks to this approach, the malware does not activate its functions when working in an analysis environment, which, as a rule, does not very realistically emulate mouse movements," experts explain.
To do this, LummaC2 takes an interval of 300 milliseconds and checks the cursor position with this frequency. This process will be repeated until the five consecutive cursor positions (P0, P1, P2, P3, and P4) do not differ.
The malware treats cursor positions as vectors, calculating the angle that is obtained between two consecutive vectors (P01-P12, P12-P23, and P23-P34).
"If all calculated angles are below 45 degrees, LummaC2 v4. 0 makes sure that a person is moving the mouse. After that, malicious functions are activated," the experts conclude.
According to researchers from Outpost24, the described method helps operators to freeze the activation of the malware until mouse activity is detected.
LummaC2, written in C, is being sold on cybercriminal forums from December 2022. The authors of the Trojan periodically expand its functionality. Developers pay special attention to antianalysis methods.
The current version of LummaC2, now numbered v4. 0, requires operators to use a cryptor as an additional concealment measure. This helps fight malware code leaks.
In addition, the new sample demonstrated the use of trigonometry to detect human activity on the attacked host.
"The new technique used by the malware relies on the position of the mouse cursor, which is calculated in a short period of time — this helps to detect human activity. Thanks to this approach, the malware does not activate its functions when working in an analysis environment, which, as a rule, does not very realistically emulate mouse movements," experts explain.
To do this, LummaC2 takes an interval of 300 milliseconds and checks the cursor position with this frequency. This process will be repeated until the five consecutive cursor positions (P0, P1, P2, P3, and P4) do not differ.

The malware treats cursor positions as vectors, calculating the angle that is obtained between two consecutive vectors (P01-P12, P12-P23, and P23-P34).

"If all calculated angles are below 45 degrees, LummaC2 v4. 0 makes sure that a person is moving the mouse. After that, malicious functions are activated," the experts conclude.
