Analyzing Phishing Attacks: Lumma Stealer and PowerShell Obfuscation

This blog is gonna be about analyzing and identifying a phishing scheme leading into a dropper that executes a stealer(credits to my associate that encountered this) Starting off my friend encountered this very peculiar website that asked him to pasteโฆ