Tedi Heriyanto
Blogs, Articles, and Posts
Exploring PowerShell Reflective Loading in Lumma Stealer
(medium.com)
One of the most common techniques I've seen used by threat actors to deliver Lumma Stealer payloads
By: Tedi Heriyanto submitted:Jan 31 2025
One of the most common techniques I've seen used by threat actors to deliver Lumma Stealer payloads
to victims is Reflective Loading, leveraging the .NET library. Reflective Loading is a technique...
By: Tedi Heriyanto submitted:Jan 31 2025