LummaC2 is a new generation stealer, average knock 75-85%, works even on clean systems, no dependencies (AT ALL), log decryption on the server, build weight 150-300KB, steals Chromium and Mozilla based browsers, steals ~70 browser cryptocurrency and 2FA extensions, has a new method of bypassing Google unlogins (validity reaches 90-95%), non-resident Loader, low-level adaptive filegrabber, AI to detect bots in the panel, and the latest unique development - BINARY MORPHER. LummaC2 is updated literally every two hours, add your specific browser or your specific extension - 2 clicks! Technical information: - The language used in the development of this product is C
- Virtually no high-level WINAPI is used
- The product is on the most powerful servers with anti-DDoS protection.
- All decryption is completely server-based, all data transmitted by the stealer is decrypted on the server.
- In order to increase chunking, data is sent in chunks.
- The weight of the build is 150-300KB, CRT is present but not used, on request if you care about weight, link CRT from another studio, the weight will decrease in the process, UPX will compress the build to 80KB, but it is not recommended to do this procedure
- A neighbor detection system is available, as well as a traffic quality monitoring system
- System calls support ARM, x86, x64 architectures
- Stealer works on operating system versions from Windows 7 x32 to Windows 11 x64 with the latest updates.
- There is a knock in Telegram bot / channel, both about the arrival of the log, and the log itself
- All interaction with the OS is done through calls to a low-level wrapper written in ASM over system calls, no WinAPI only manual syscall calls (corporate rate).
- Where WinAPI is used - its calls are encrypted (read custom GetProcAddress)
- Implemented Heavens Gate technology allowing to switch from WoW64 mode (corporate tariff)
- Spreading without crypt protection
- DomainDetect is included in the log format
- Build is covered by default by our binary morpher with Control flow.
- Non-residential Loader
- Google unlogins bypass implemented (90-95% validity)
- CC collection is implemented
- Gasket rotation is implemented, 1+10 addresses are sewn into the build (instead of 1+1 main and backup addresses before), it increases survivability and stability of the build many times.
Screenshot of panel (Clickable) Log format: Pricing plans: EXPERIENCED - Set filters up to 10 .
- Download logs in bulk
- Possibility to upload logs by your search query (for example - only with wallets or only with instagram.com)
- Ability to use search by parameters (country, with or without currency, with a specific filter)
- Ability to clear dumps, dumps statistics on the "quality of logs" page
- 3 tags for builds
PRICE: $250/month -------- PROFESSIONAL - All features of previous privileges
- Unlimited number of filters
- Logs can be deleted in bulk (by zeroing the counter)
- Share your stats with others
- Logs quality widget available
- Filter widget is available
- Search widened, logs search and downloading is available by request (in cookies/passwords)
- Ability to monitor number of neighbors in logs
- Logs quality rating system available
- Ability to create and edit grabber profiles
- Ability to add and remove extensions
- Ability to add and remove browsers
- Ability to add and remove paths for looting
- Ability to use masks as well as variable paths
- Ability to edit the data to be collected and the order of data collection, e.g. someone needs to collect cid phrases first and someone needs to collect chrome first
- Ability to customize the depth of data collection
- Ability to always roll back to default settings
- Ability to create an unlimited number of rules in the profile
- Ability to edit profile "hot", to change data collected by the stealer right during spreading
- Non-residential Loader
PRICE: $500/month -------- CORPORATE - Previous privileges features
- Dedicated build cleanup line, build is cleaned more often
- Improved bypass of proactive protection (no message LummaC2.exe tries to access password store), build lives longer
- Google Unlogging Bypass (90-95% validity)
- Great for you-know-where point-level security breaches
- Generation of random builds by our morpher, each build is individual, different from the other
PRICE: $1.000/month FAQQuestion: What happens after my subscription ends? Answer: If your subscription ends, your traffic will not go anywhere, after the resumption of the subscription, logs during your inactivity will be waiting for you in the panel, this applies to ALL tariff plans. Question: What guarantee on bounce rate? Answer: It is impossible to say for sure at any particular moment, it depends on crypto and on how much time has passed after cleaning. In average on different exchanges and different crypto is 75%-85%. Question: If I bought some tariff and its price increased during the process, will I pay this difference in price? Answer: The clients, who bought the tariff the price is not indexed, the prices are indexed only for the new clients. Question: How often does the cleaning take place? Answer: We try to clean the build as often as possible. All tariffs except corporate are cleaned every 5 days. Corporate rate is cleaned every 2 days. Question: Is crypt required? Answer: Yes, crypt is required. The build is native, it is easy to crypt - there are partners who will make you a crypt without any problems. Question: Does the stealer knock in CIS? Answer: No and will not knock. Do not offer us any money - in any case there will be a refusal. • Contacts(RU/EN): Support/Seller - @lummaseller126 Telegram Channel (Clickable) |