General
-
Target
65b159164f936a8f15e1673cb6e5b7c0c87707fc2524b746c8f049949ccd1bf0
-
Size
4.5MB
-
Sample
240705-2cjehszeqd
-
MD5
b07543ce10033160a338e01933cb8b86
-
SHA1
30b8d4fd6864e3a056c1d57320efff1bb89c2228
-
SHA256
65b159164f936a8f15e1673cb6e5b7c0c87707fc2524b746c8f049949ccd1bf0
-
SHA512
26389076fddf72f5318065b2f6112a7973b059a449160cf974adf3ff3b883a3f2dd154eb472c0b02d6b2ddd9f0f76799bfebc969944fe9ae678fb849c32dd716
-
SSDEEP
98304:zXtrbTA1+sVDTXLW6jRhdGVQguhhW31ZO:z9c1+0zL5LdGVzu+lE
Static task
static1
Behavioral task
behavioral1
Sample
65b159164f936a8f15e1673cb6e5b7c0c87707fc2524b746c8f049949ccd1bf0.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
65b159164f936a8f15e1673cb6e5b7c0c87707fc2524b746c8f049949ccd1bf0.exe
Resource
win10v2004-20240704-en
Malware Config
Extracted
lucastealer
https://api.telegram.org/bot6068798932:AAG_cHiqinDwNZ3Hd-rdp8tPwbT0czdVwTw
Targets
-
-
Target
65b159164f936a8f15e1673cb6e5b7c0c87707fc2524b746c8f049949ccd1bf0
-
Size
4.5MB
-
MD5
b07543ce10033160a338e01933cb8b86
-
SHA1
30b8d4fd6864e3a056c1d57320efff1bb89c2228
-
SHA256
65b159164f936a8f15e1673cb6e5b7c0c87707fc2524b746c8f049949ccd1bf0
-
SHA512
26389076fddf72f5318065b2f6112a7973b059a449160cf974adf3ff3b883a3f2dd154eb472c0b02d6b2ddd9f0f76799bfebc969944fe9ae678fb849c32dd716
-
SSDEEP
98304:zXtrbTA1+sVDTXLW6jRhdGVQguhhW31ZO:z9c1+0zL5LdGVzu+lE
Score10/10-
Modifies WinLogon for persistence
-
Modifies visiblity of hidden/system files in Explorer
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1