Hello! Our network malware detection team from PT found interesting falses in these Lumma rules:
sid: 2064237 rev: 1 ET MALWARE Lumma Stealer CnC Checkin (/info)
sid: 2064238 rev: 1 ET MALWARE Lumma Stealer CnC Server Response
sid: 2064241 rev: 1 ET MALWARE Lumma Stealer CnC Checkin (/update)
sid: 2064261 rev: 1 ET MALWARE Lumma Stealer CnC Checkin (GET)
sid: 2064262 rev: 1 ET MALWARE Lumma Stealer CnC Checkin (/ycl)
sid: 2064271 rev: 1 ET MALWARE Lumma Stealer CnC Checkin (/service)
The false consists in the Lumma family because the rules detect GCleaner loader.
Some example:
For example, you can see the C2 communication description of GCleaner here → Deep Analysis of GCleaner - n1ghtw0lf
All Accept headers from the screenshot above are the same.
Also you can check the files verdict. 9c44f98f428e7a562553944c3067f73b from the rules is not Lumma stealer, this is downloader.
We suppose the msg-s need to be changed, what do you think?