alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET MALWARE [ANY.RUN] Win32/Lumma Stealer Check-In"; flow:established,to_server; http.method; content:"POST"; http.request_body; content:"act="; startswith; content:"&lid="; distance:0; fast_pattern; content:"&j="; distance:0; content:"&ver="; distance:0; isdataat:!5,relative; reference:md5,884478741e7046e6d0788b63c09df89f; reference:url,app.any.run/tasks/409f5138-3853-4910-80d4-3c380b969274; classtype:command-and-control; sid:2048093; rev:1; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, created_at 2023_09_15, deployment Perimeter, former_category MALWARE, malware_family lumma, confidence High, signature_severity Critical, updated_at 2023_09_15;)
Metadata | |
---|
affected_product | Windows_XP_Vista_7_8_10_Server_32_64_Bit |
attack_target | Client_Endpoint |
created_at | 2023_09_15 |
deployment | Perimeter |
former_category | MALWARE |
malware_family | lumma |
confidence | High |
signature_severity | Critical |
updated_at | 2023_09_15 |