← Back to SOC feed Coverage →

ThreatFox: Lumma Stealer IOCs

ioc-hunt HIGH ThreatFox
UrlClickEvents
infostealeriocthreatfoxwin-lumma
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at ThreatFox →
Retrieved: 2026-05-07T23:00:00Z · Confidence: high

Hunt Hypothesis

Lumma Stealer is likely exfiltrating sensitive data via compromised endpoints, leveraging phishing emails as its primary delivery vector. SOC teams should proactively hunt for this behavior in Azure Sentinel to detect and mitigate data exfiltration early, preventing further compromise and data loss.

IOC Summary

Malware Family: Lumma Stealer Total IOCs: 3 IOC Types: url

TypeValueThreat TypeFirst SeenConfidence
urlhxxps://fourdigs.cyoubotnet_cc2026-05-0775%
urlhxxps://honceybl.cyoubotnet_cc2026-05-0775%
urlhxxps://balvlqts.cyoubotnet_cc2026-05-0775%

KQL: Url Hunt

// Hunt for access to known malicious URLs
// Source: ThreatFox - Lumma Stealer
let malicious_urls = dynamic(["https://fourdigs.cyou", "https://honceybl.cyou", "https://balvlqts.cyou"]);
UrlClickEvents
| where Url has_any (malicious_urls)
| project Timestamp, AccountUpn, Url, ActionType, IsClickedThrough
| order by Timestamp desc

Required Data Sources

Sentinel TableNotes
UrlClickEventsEnsure this data connector is enabled

References

False Positive Guidance

Original source: https://threatfox.abuse.ch/browse/malware/win.lumma/