General

  • Target

    Akrien premium 4.0.exe

  • Size

    4.3MB

  • Sample

    240105-tp4xzsfahm

  • MD5

    58d82461f610bf5234c28a1a67cbd123

  • SHA1

    6aac74dd950ee1a9b14adaabb1fea942fc921ac9

  • SHA256

    63b24a2fbe28c375ca03f45592b7dcbfdfed9262f1ad51efb6bd544429a885d0

  • SHA512

    52d9f2daa360f7e84bc764092076d50216687f6c4c22afd3e3017188f1cb3ab2eafce76b968cd1f6feb412639277cf3439fe613647cdffa216dfa30bf0580ef2

  • SSDEEP

    49152:g/5tJDBRnrQkbB1CjaorTkjf5O5rihkRbxdkkYgpX6tkWuiZMh5WEWkwwTMj:ab6SROk7AOkwZ

Malware Config

Extracted

Family

lucastealer

C2

https://api.telegram.org/bot6087457936:AAHy4hAAAw4TgaA5qmU8dL7mR7D5TTkyy_o

Targets

    • Target

      Akrien premium 4.0.exe

    • Size

      4.3MB

    • MD5

      58d82461f610bf5234c28a1a67cbd123

    • SHA1

      6aac74dd950ee1a9b14adaabb1fea942fc921ac9

    • SHA256

      63b24a2fbe28c375ca03f45592b7dcbfdfed9262f1ad51efb6bd544429a885d0

    • SHA512

      52d9f2daa360f7e84bc764092076d50216687f6c4c22afd3e3017188f1cb3ab2eafce76b968cd1f6feb412639277cf3439fe613647cdffa216dfa30bf0580ef2

    • SSDEEP

      49152:g/5tJDBRnrQkbB1CjaorTkjf5O5rihkRbxdkkYgpX6tkWuiZMh5WEWkwwTMj:ab6SROk7AOkwZ

    • Luca Stealer

      Info stealer written in Rust first seen in July 2022.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks