General

  • Target

    5c716264acfa43a258fdb03007e2e787b230230e7e1d4d5bbcf256810b02909e

  • Size

    4.6MB

  • Sample

    231120-jxyqtsee89

  • MD5

    4fb226993825558cca2e8aa844033078

  • SHA1

    f3fa3d94a7a01970a99f9dcf5fad250be30b8fd2

  • SHA256

    5c716264acfa43a258fdb03007e2e787b230230e7e1d4d5bbcf256810b02909e

  • SHA512

    c5ab520f0953ed53e682d811b6d51be11c4e831fa890913d1d2eb7ed03e2102c882f933f48bf8831b8ca5a605da7a98a6524b5a5cb6de1fd9d16351a2b53a2f8

  • SSDEEP

    98304:utrbTA143lUrmaEXLW6jRhdGVQguhhW31Zo:Qc14IML5LdGVzu+la

Malware Config

Extracted

Family

lucastealer

C2

https://api.telegram.org/bot6068798932:AAG_cHiqinDwNZ3Hd-rdp8tPwbT0czdVwTw

Targets

    • Target

      5c716264acfa43a258fdb03007e2e787b230230e7e1d4d5bbcf256810b02909e

    • Size

      4.6MB

    • MD5

      4fb226993825558cca2e8aa844033078

    • SHA1

      f3fa3d94a7a01970a99f9dcf5fad250be30b8fd2

    • SHA256

      5c716264acfa43a258fdb03007e2e787b230230e7e1d4d5bbcf256810b02909e

    • SHA512

      c5ab520f0953ed53e682d811b6d51be11c4e831fa890913d1d2eb7ed03e2102c882f933f48bf8831b8ca5a605da7a98a6524b5a5cb6de1fd9d16351a2b53a2f8

    • SSDEEP

      98304:utrbTA143lUrmaEXLW6jRhdGVQguhhW31Zo:Qc14IML5LdGVzu+la

    • Luca Stealer

      Info stealer written in Rust first seen in July 2022.

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Modifies Installed Components in the registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks