General

  • Target

    f6c5df8944a965d0d3aa2e124a1935af.bin

  • Size

    9.0MB

  • Sample

    231104-drp9lscb41

  • MD5

    f6c5df8944a965d0d3aa2e124a1935af

  • SHA1

    3ff36a13827d193a85eed40b59646bad1d676986

  • SHA256

    41554c195bc8c87ddb8bbeacefe77c033f56549a03361dd76c2243546dd1f2d8

  • SHA512

    8d75df03c33e9288b2d4b9e941c89ca2e0e7008e151ee3c104292427266043050f9966d0ff6e5c46890bde404337873768a4cde255778418144766646d08ceae

  • SSDEEP

    196608:cTEcVnJULKrytYcJX7Nfjw9cI1qyz+6weSn5NeCX4X6:4EcVnukcJLtlIwqwemrePX6

Malware Config

Extracted

Family

lucastealer

C2

https://api.telegram.org/bot5749635914:AAHO1FmA3UVCNqptBOADqQF-cFGUoMOYe6g

Targets

    • Target

      f6c5df8944a965d0d3aa2e124a1935af.bin

    • Size

      9.0MB

    • MD5

      f6c5df8944a965d0d3aa2e124a1935af

    • SHA1

      3ff36a13827d193a85eed40b59646bad1d676986

    • SHA256

      41554c195bc8c87ddb8bbeacefe77c033f56549a03361dd76c2243546dd1f2d8

    • SHA512

      8d75df03c33e9288b2d4b9e941c89ca2e0e7008e151ee3c104292427266043050f9966d0ff6e5c46890bde404337873768a4cde255778418144766646d08ceae

    • SSDEEP

      196608:cTEcVnJULKrytYcJX7Nfjw9cI1qyz+6weSn5NeCX4X6:4EcVnukcJLtlIwqwemrePX6

    • Luca Stealer

      Info stealer written in Rust first seen in July 2022.

    • Luca Stealer payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Collection

Data from Local System

2
T1005

Tasks