
Summary
This analytic rule aims to detect download attempts of the Lumma Stealer malware using Cisco Secure Firewall's Intrusion Events. It operates by analyzing Cisco Secure Firewall Threat Defense Intrusion Event logs for specific Snort signatures that indicate potential Lumma Stealer activity. The rule is designed to identify if any of the specified signatures (IDs 64797, 64798, 64799, 64800, 64801, 64167, 64168, 64169) were triggered, which may suggest an ongoing infection by the Lumma Stealer. If the behavior is confirmed to be malicious, it signifies a potential security breach that should be addressed immediately. The detection process utilizes a search query to filter and analyze the relevant logs, ensuring efficient monitoring for this particular threat. Additionally, the rule includes provisions for testing, handling false positives, and providing relevant context for risk assessment based on the detection results.
Categories
- Network
Data Sources
- Firewall
- Cloud Service
ATT&CK Techniques
- T1041
- T1573.002
Created: 2025-04-26