Concrete signature match: Behavior for 32-bit Windows platform, family SuspLumma
This is a behavioral detection for the Lumma information stealer, a potent malware designed to steal sensitive data. It actively exfiltrates information from web browsers, such as passwords and cookies, and targets cryptocurrency wallets. The detection indicates the system exhibited behavior strongly associated with this specific malware family.
No detailed analysis available from definition files.
Isolate the affected machine from the network immediately to prevent data exfiltration. Run a full antivirus scan to remove all malicious components. After remediation, change all passwords for accounts used on this machine and monitor for fraudulent activity.