An individual on Reddit reported purchasing a USB-based vibrator and, when attempting to charge the device, was inundated with web browser pages opening, the antivirus flagged the files as malicious. tl;dr vibrator delivering Lumma stealer File shared: tria.ge/240215-xvx86seb91
Replying to @vxunderground
Interesting. I submitted the same file (hashes match) 2 days after this submission and it came back with 8/10 instead of 10/10? Diff machine selection for analysing it? tria.ge/240217-27slnsbf3x

Feb 17, 2024 · 11:33 PM UTC

1
5
Yes. Some of them submitted were further down in the zip and didnt include the xml "bomb." Some used a variation of win10/11. They also have interactive sessions which got more IOCs out of the files, running as admin/non admin/modifying the compatibility setting in the execution.
1
2
Ah, thank you for the explanation.