Apr 17, 2026 • SANS Internet Storm Center
Lumma Stealer infection with Sectop RAT (ArechClient2), (Fri, Apr 17th)
This article documents a co-infection campaign involving Lumma Stealer (an information-stealing malware) and Sectop RAT (also known as ArechClient2, a remote...
Executive Summary
This article documents a co-infection campaign involving Lumma Stealer (an information-stealing malware) and Sectop RAT (also known as ArechClient2, a remote access trojan). Lumma Stealer targets sensitive credentials, browser data, and cryptocurrency wallets, while Sectop RAT provides threat actors with persistent remote access and additional post-exploitation capabilities. The combination of an infostealer with RAT functionality creates a potent threat capable of data theft, lateral movement, and prolonged compromise. Organizations should ensure robust endpoint detection, restrict software execution from untrusted sources, and monitor for command-and-control beaconing to mitigate this dual-threat malware campaign.
Summary
Introduction
Published Analysis
This article documents a co-infection campaign involving Lumma Stealer (an information-stealing malware) and Sectop RAT (also known as ArechClient2, a remote access trojan). Lumma Stealer targets sensitive credentials, browser data, and cryptocurrency wallets, while Sectop RAT provides threat actors with persistent remote access and additional post-exploitation capabilities. The combination of an infostealer with RAT functionality creates a potent threat capable of data theft, lateral movement, and prolonged compromise. Organizations should ensure robust endpoint detection, restrict software execution from untrusted sources, and monitor for command-and-control beaconing to mitigate this dual-threat malware campaign. Introduction Introduction
Linked Entities
- ArechClient2
- Lumma Stealer
- Sectop RAT