← Back to SOC feed Coverage →

ThreatFox: Lumma Stealer IOCs

ioc-hunt HIGH ThreatFox
UrlClickEvents
infostealeriocthreatfoxwin-lumma
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at ThreatFox →
Retrieved: 2026-04-22T09:00:00Z · Confidence: high

Hunt Hypothesis

The ThreatFox: Lumma Stealer IOCs rule detects potential indicators of a data-exfiltration malware that steals credentials and sensitive data through phishing or compromised websites. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify and mitigate early-stage compromises before significant data loss occurs.

IOC Summary

Malware Family: Lumma Stealer Total IOCs: 2 IOC Types: url

TypeValueThreat TypeFirst SeenConfidence
urlhxxps://brorgma.cyoubotnet_cc2026-04-2275%
urlhxxps://mastojh.cyoubotnet_cc2026-04-2275%

KQL: Url Hunt

// Hunt for access to known malicious URLs
// Source: ThreatFox - Lumma Stealer
let malicious_urls = dynamic(["https://brorgma.cyou", "https://mastojh.cyou"]);
UrlClickEvents
| where Url has_any (malicious_urls)
| project Timestamp, AccountUpn, Url, ActionType, IsClickedThrough
| order by Timestamp desc

Required Data Sources

Sentinel TableNotes
UrlClickEventsEnsure this data connector is enabled

References

False Positive Guidance

Original source: https://threatfox.abuse.ch/browse/malware/win.lumma/