General

  • Target

    319157bf510e966d20d5129f1966ece7cb18c2d3d781a31a95f0af3be5926749

  • Size

    5.7MB

  • Sample

    230225-2cf96aee7z

  • MD5

    deb9c6e9c058071ebf52521065a75018

  • SHA1

    d3f54b15504de1a55d26a5753f1254c5c42fadec

  • SHA256

    319157bf510e966d20d5129f1966ece7cb18c2d3d781a31a95f0af3be5926749

  • SHA512

    404d63f29db4b8edf4f5b73442e8e0c4dd58829b57bd2a75149d07acbd105cc9958429231f7f42dfb514824b62c7990d03913fbfd54d2e16273fd406e380be37

  • SSDEEP

    49152:7Zg+YZ4PyxV4maKAUerq93kBis7q9mMts5lfarmNP78xMng+HEvLV+io6B5i5lSy:fFsaAnc6ZcIUk+r

Malware Config

Extracted

Family

lucastealer

C2

https://api.telegram.org/bot6249891715:AAHZEDDcXRzwxaRB7SWAXFemlsWG62Pr15U

Targets

    • Target

      319157bf510e966d20d5129f1966ece7cb18c2d3d781a31a95f0af3be5926749

    • Size

      5.7MB

    • MD5

      deb9c6e9c058071ebf52521065a75018

    • SHA1

      d3f54b15504de1a55d26a5753f1254c5c42fadec

    • SHA256

      319157bf510e966d20d5129f1966ece7cb18c2d3d781a31a95f0af3be5926749

    • SHA512

      404d63f29db4b8edf4f5b73442e8e0c4dd58829b57bd2a75149d07acbd105cc9958429231f7f42dfb514824b62c7990d03913fbfd54d2e16273fd406e380be37

    • SSDEEP

      49152:7Zg+YZ4PyxV4maKAUerq93kBis7q9mMts5lfarmNP78xMng+HEvLV+io6B5i5lSy:fFsaAnc6ZcIUk+r

    • Luca Stealer

      Info stealer written in Rust first seen in July 2022.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks