This article provides supplementary materials for a Lumma Stealer infection analysis initially discussed in an ISC SANS diary entry. It details follow-up malware discovered during the investigation, offering technical resources for security analysts to examine the attack's traffic patterns and execution behavior.
The provided resources include a network traffic capture (PCAP) of the infection, a list of Indicators of Compromise (IOCs), and the malware samples themselves. These files are essential for understanding the communication patterns and secondary payloads associated with this specific Lumma Stealer campaign.
Top comments (0)