General

  • Target

    33.bin.zip

  • Size

    517KB

  • Sample

    231008-p48r9scb5v

  • MD5

    adcc50d15e0b001a29604a9d9baee2e8

  • SHA1

    02a9427136efd4fc1159e24d8645e944aa676337

  • SHA256

    4d39b23c7878830c7ec428f0ea6949aeeb9822004ab1d579940b89c1b9201e50

  • SHA512

    811c8bccf800e51cf482e9da70f6a9acfa9074543d4659f237b97873d4252f96e1133a9f2e6fba2613803116a1d28cce83f929257ada846e7108fde34e2c1321

  • SSDEEP

    12288:fz4V66hAeEiOlv7nBVsMfmn/8pEmMLDhAoDMZgG7CH2rXm5zqoo:fz4zhpOxbvxfo/THP+NZf79Azq7

Malware Config

Targets

    • Target

      33.bin

    • Size

      2.5MB

    • MD5

      a094693a978562418fdd5cf8b605a52b

    • SHA1

      89f2b7014486ac0528a47fa6caaedff45d02e9c9

    • SHA256

      336e044e990d0d7e5ffeb12923b9e171b823a751d165976893bfe4d714d4b4f9

    • SHA512

      4fa6003569ca0b93aef3f75abd46ec242adee2547fe74f774fa44cbd13eefcc8aaef087475e42a63dce3575146d1ee76c038692f1a2400806a489a11adb58569

    • SSDEEP

      49152:oxnjHmbOaZiqi75PBZ5oJFDr7CMfdmM0VSGn:rXZiqi7/kzfdmM0VSGn

    • Luca Stealer

      Info stealer written in Rust first seen in July 2022.

    • Luca Stealer payload

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks