📖 Overview
A URL-based indicator has been identified hosting a login panel associated with Lumma Stealer C2 operations. The site presents a credential input form with optional two-factor code support, which is typical for botnet administration portals. Confidence is assessed at 50%, indicating a potential but not yet fully confirmed Lumma C2 instance.
📌 Key Details
Field | Information |
---|---|
Type | URL |
Indicator | mikhail-bulgakov[.]su/login |
Threat Type | Botnet C2 |
Malware | win.lumma |
Confidence | 50% |
Date | 16 Sep 2025 – 05:29:46 UTC |
Tags | C2, Lumma, URLscan |
Reporter | juroots |
🔎 URLScan Result
Page Title: Вход
Screenshot: https://urlscan.io/screenshots/0199514b-5601-704a-a115-aed83d36d5ee.png
Result: https://urlscan.io/result/0199514b-5601-704a-a115-aed83d36d5ee/

📡 Related Intelligence
VirusTotal Report: https://www.virustotal.com/gui/url/ddd8a3a4dbb465ee338cbda040e254b0eba05fa3802f736c07077b9e39160d4f
Reference: https://urlscan.io/result/01995100-1c34-76d8-adc6-771f837c024c
🛡️ Defensive Guidance
- Block
mikhail-bulgakov[.]su
at DNS, proxy, and endpoint layers. - Monitor for HTTP/S traffic attempting to authenticate to
/login
. - Hunt for Lumma Stealer IOCs in endpoint logs and memory artifacts.
- Review telemetry for connections to domains mimicking literary or cultural references (a tactic observed in some C2 setups).
⚠️ Confidence is moderate (50%), meaning this IOC should be added to watchlists and monitored closely until more evidence validates its C2 role.