General
-
Target
payload
-
Size
9.0MB
-
Sample
231102-zy2f4shf43
-
MD5
f6c5df8944a965d0d3aa2e124a1935af
-
SHA1
3ff36a13827d193a85eed40b59646bad1d676986
-
SHA256
41554c195bc8c87ddb8bbeacefe77c033f56549a03361dd76c2243546dd1f2d8
-
SHA512
8d75df03c33e9288b2d4b9e941c89ca2e0e7008e151ee3c104292427266043050f9966d0ff6e5c46890bde404337873768a4cde255778418144766646d08ceae
-
SSDEEP
196608:cTEcVnJULKrytYcJX7Nfjw9cI1qyz+6weSn5NeCX4X6:4EcVnukcJLtlIwqwemrePX6
Static task
static1
Behavioral task
behavioral1
Sample
payload.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
payload.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
lucastealer
https://api.telegram.org/bot5749635914:AAHO1FmA3UVCNqptBOADqQF-cFGUoMOYe6g
Targets
-
-
Target
payload
-
Size
9.0MB
-
MD5
f6c5df8944a965d0d3aa2e124a1935af
-
SHA1
3ff36a13827d193a85eed40b59646bad1d676986
-
SHA256
41554c195bc8c87ddb8bbeacefe77c033f56549a03361dd76c2243546dd1f2d8
-
SHA512
8d75df03c33e9288b2d4b9e941c89ca2e0e7008e151ee3c104292427266043050f9966d0ff6e5c46890bde404337873768a4cde255778418144766646d08ceae
-
SSDEEP
196608:cTEcVnJULKrytYcJX7Nfjw9cI1qyz+6weSn5NeCX4X6:4EcVnukcJLtlIwqwemrePX6
Score10/10-
Luca Stealer payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-