This article provides supplementary data regarding a Lumma Stealer infection originally documented in an Internet Storm Center (ISC) SANS diary. It focuses on the secondary malware identified during the analysis, offering comprehensive resources for deeper investigation into the traffic patterns and execution behavior of the threat.
The provided resources include a list of Indicators of Compromise (IOCs), a packet capture (PCAP) file of the infection traffic, and the malware samples themselves. These files are password-protected according to the site's updated security policy and serve as a reference for security researchers analyzing info-stealer propagation and post-infection activity.
Top comments (0)