General

  • Target

    018f1b987d7d79a024055b9ad168a866856a4b1d5c9f14809375cade8c9fc691.zip

  • Size

    4.1MB

  • Sample

    220918-slg4dabde5

  • MD5

    f493aef25efa79eda78d09867a7e228c

  • SHA1

    19e7d6f824ea0c7e05e4aca8c0a9fbc0a7ec5ab0

  • SHA256

    d363a849b1c4a3644b9dcfb3d03f96eb8bf3f6b05a8286f0911396c2b4642432

  • SHA512

    4ac6dc71fca38d6d366499925108b5628f4a692c09f1b17154c0aaccb5f485cbd87d8f03e797149d93775ce343df46f75809cc5cfb27e08147466e145ef45d78

  • SSDEEP

    98304:NWnfwiLhfAetymEf8YOW68JHk4lGxwREoWQJ+rJSXFtVgxSjkKaKN:NqwEIYuOkEmGqW7JutVnkDU

Malware Config

Targets

    • Target

      018f1b987d7d79a024055b9ad168a866856a4b1d5c9f14809375cade8c9fc691

    • Size

      4.2MB

    • MD5

      7bf21e9170fda8ffa3c22c892ecef29a

    • SHA1

      ffbc2327df43ff7868ff2eeeeebbdb721bd522d1

    • SHA256

      018f1b987d7d79a024055b9ad168a866856a4b1d5c9f14809375cade8c9fc691

    • SHA512

      763db449afe12f277952a3fc4dbcb18bae0bc34ad64f6155663be7553f3428d5b04b268b2ed1985b7ac7e15d80ee3646e783ada29f451801ac854674efd09396

    • SSDEEP

      98304:Jm3Nfl9RXKKcB6fu4R1I/1C6KxLKwqcOIb6Csebp82yY837nB:Y3NflLXVcB6fu4R1uCFxKOPba2ylrB

    • Luca Stealer

      Info stealer written in Rust first seen in July 2022.

    • Luca Stealer payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks