: Saved passwords, cookies, autofill data, and credit card details from Chrome, Edge, and Firefox.
: Upon execution, it attempts to bypass Windows Defender, establishes persistence, and communicates with a Command & Control (C2) server to exfiltrate data. Data Targeted If executed, the malware seeks to steal: moe-moe.rar
: Most commonly associated with Lumma Stealer , a Malware-as-a-Service (MaaS) that targets sensitive data. : Saved passwords, cookies, autofill data, and credit
: Stop the malware from sending your data to the attacker's server. : Stop the malware from sending your data
: Screenshots, hardware specifications, and IP address. Recommended Actions If you have interacted with this file:
: From a clean device , change passwords for your primary email, banking, and any accounts involving financial data.
: Usually contains an executable (e.g., moe-moe.exe ) or a shortcut file (.lnk) designed to trigger a PowerShell script.