ET MALWARE [ANY.RUN] Win32/Lumma Stealer ExfiltrationSource: et/open
alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration"; flow:established,to_server; http.method; content:"POST"; http.request_body; content:"Content-Disposition|3a 20|form-data|3b 20|name=|22|act|22 0d 0a 0d 0a|send_message|0d 0a|--"; fast_pattern; content:"Content-Disposition|3a 20|form-data|3b 20|name=|22|hwid|22 0d 0a 0d 0a|"; content:"Content-Disposition|3a 20|form-data|3b 20|name=|22|lid|22 0d 0a 0d 0a|"; content:"Content-Disposition|3a 20|form-data|3b 20|name=|22|file|22 3b|"; threshold:type limit,seconds 30,count 1,track by_dst; reference:md5,884478741e7046e6d0788b63c09df89f; reference:url,app.any.run/tasks/409f5138-3853-4910-80d4-3c380b969274; classtype:command-and-control; sid:2048094; rev:1; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, created_at 2023_09_15, deployment Perimeter, former_category MALWARE, malware_family lumma, confidence High, signature_severity Critical, updated_at 2023_09_15, reviewed_at 2023_09_15;)
Reference
md5Search Brave for 884478741e7046e6d0788b63c09df89f
md5Search Google for 884478741e7046e6d0788b63c09df89f
URLhttp://app.any.run/tasks/409f5138-3853-4910-80d4-3c380b969274
Metadata
affected_productWindows_XP_Vista_7_8_10_Server_32_64_Bit
attack_targetClient_Endpoint
created_at2023_09_15
deploymentPerimeter
former_categoryMALWARE
malware_familylumma
confidenceHigh
signature_severityCritical
updated_at2023_09_15
reviewed_at2023_09_15