This report highlights the forensic artifacts associated with a recent malware campaign involving Lumma Stealer and Sectop RAT (also known as ArechClient2). These materials are provided in support of a SANS ISC diary entry, offering deep insights into the infection workflow and communication patterns of these persistent threats.
The dataset includes Indicators of Compromise (IOCs), detailed network packet captures (PCAPs), and the malware binaries recovered during the infection. These resources are invaluable for security researchers and SOC analysts looking to refine their detection logic and conduct detailed behavior analysis in a controlled environment.
Top comments (0)