Resubmissions

06-01-2024 13:46

240106-q22rlsheep 10

05-01-2024 17:03

240105-vk4xvsfcgk 10

General

  • Target

    Akrien premium 4.0.exe

  • Size

    4.3MB

  • Sample

    240106-q22rlsheep

  • MD5

    8af52c532dee095626de6c3ae0b182bb

  • SHA1

    fa981b39bf3a83e2f68b9f95cb4a968a0fc99d23

  • SHA256

    4a6fa79f84ec213fe6c3a5776a878a2e5734d96819a9bbc865b00bc966cdf976

  • SHA512

    8be5a9d7209b01b3f4e758a63cd0dc272fb33bb53370834f9c564633991e9cce3d8cc9d6efdb3d1554ac209adc6a34afe8db18dbe86b25395e89be590c68e76a

  • SSDEEP

    49152:g/5tJDBRnrQkbB1CjaorTkjf5O5rihkRbxdkkYgpX6tkWuiZMh5WEWkwYTMj:ab6SROk7AOkwB

Score
10/10

Malware Config

Extracted

Family

lucastealer

C2

https://api.telegram.org/bot6087457936:AAHy4hAAAw4TgaA5qmU8dL7mR7D5TTkyy_o

Targets

    • Target

      Akrien premium 4.0.exe

    • Size

      4.3MB

    • MD5

      8af52c532dee095626de6c3ae0b182bb

    • SHA1

      fa981b39bf3a83e2f68b9f95cb4a968a0fc99d23

    • SHA256

      4a6fa79f84ec213fe6c3a5776a878a2e5734d96819a9bbc865b00bc966cdf976

    • SHA512

      8be5a9d7209b01b3f4e758a63cd0dc272fb33bb53370834f9c564633991e9cce3d8cc9d6efdb3d1554ac209adc6a34afe8db18dbe86b25395e89be590c68e76a

    • SSDEEP

      49152:g/5tJDBRnrQkbB1CjaorTkjf5O5rihkRbxdkkYgpX6tkWuiZMh5WEWkwYTMj:ab6SROk7AOkwB

    Score
    6/10
    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks