alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration"; flow:established,to_server; http.method; content:"POST"; http.request_body; content:"Content-Disposition|3a 20|form-data|3b 20|name=|22|act|22 0d 0a 0d 0a|send_message|0d 0a|--"; fast_pattern; content:"Content-Disposition|3a 20|form-data|3b 20|name=|22|hwid|22 0d 0a 0d 0a|"; content:"Content-Disposition|3a 20|form-data|3b 20|name=|22|lid|22 0d 0a 0d 0a|"; content:"Content-Disposition|3a 20|form-data|3b 20|name=|22|file|22 3b|"; threshold:type limit,seconds 30,count 1,track by_dst; reference:md5,884478741e7046e6d0788b63c09df89f; reference:url,app.any.run/tasks/409f5138-3853-4910-80d4-3c380b969274; classtype:command-and-control; sid:2048094; rev:1; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, created_at 2023_09_15, deployment Perimeter, former_category MALWARE, malware_family lumma, confidence High, signature_severity Critical, updated_at 2023_09_15, reviewed_at 2023_09_15;)
Metadata | |
---|
affected_product | Windows_XP_Vista_7_8_10_Server_32_64_Bit |
attack_target | Client_Endpoint |
created_at | 2023_09_15 |
deployment | Perimeter |
former_category | MALWARE |
malware_family | lumma |
confidence | High |
signature_severity | Critical |
updated_at | 2023_09_15 |
reviewed_at | 2023_09_15 |