General

  • Target

    ACNBZD.exe

  • Size

    5.9MB

  • Sample

    230823-2ncfcagb53

  • MD5

    021079dc0918b9c7359e93e770678000

  • SHA1

    70c03da6f7b339340b1943f5d0b7b1fd87579adf

  • SHA256

    ee63e26e84d8092fda9e527f7db34777b6261d8dfc96ed42167383f88cf1c487

  • SHA512

    9bc14753e39f2c93737886439d64a458f08265d1d8176c233a8e3f864e1f4f2751b161aa22408618d0dd343fb88b7037c8c2eee898c6d9b3bf466aaea709c5b0

  • SSDEEP

    49152:CYnF4XAvvLEDnAby0/1lzR+aJAyPfugmqNiEQG8+ECYoue5S58pzEIOh4xsPub7T:z7OryzzCJf0zBxMkeWg+O2

Malware Config

Extracted

Family

lucastealer

C2

https://api.telegram.org/bot6068798932:AAG_cHiqinDwNZ3Hd-rdp8tPwbT0czdVwTw

Targets

    • Target

      ACNBZD.exe

    • Size

      5.9MB

    • MD5

      021079dc0918b9c7359e93e770678000

    • SHA1

      70c03da6f7b339340b1943f5d0b7b1fd87579adf

    • SHA256

      ee63e26e84d8092fda9e527f7db34777b6261d8dfc96ed42167383f88cf1c487

    • SHA512

      9bc14753e39f2c93737886439d64a458f08265d1d8176c233a8e3f864e1f4f2751b161aa22408618d0dd343fb88b7037c8c2eee898c6d9b3bf466aaea709c5b0

    • SSDEEP

      49152:CYnF4XAvvLEDnAby0/1lzR+aJAyPfugmqNiEQG8+ECYoue5S58pzEIOh4xsPub7T:z7OryzzCJf0zBxMkeWg+O2

    • Luca Stealer

      Info stealer written in Rust first seen in July 2022.

    • Luca Stealer payload

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Modifies Installed Components in the registry

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks