General
-
Target
2024-12-20_d49256ff715f5c1eab0e233836adcc2e_luca-stealer_magniber
-
Size
9.0MB
-
Sample
241220-pymmvawmby
-
MD5
d49256ff715f5c1eab0e233836adcc2e
-
SHA1
c173203859e9aa8f6f879c2f261e4be2bcd0b720
-
SHA256
1a9390fbfb16f57e55d4aec702f174de39f03f57ed4c7c999041998c1b06647c
-
SHA512
0a565ef31d18414ea7e04783aae1bd0224119bbd1e5616d64f428be4acf88e028910c523171f51b6a707818c233f38d9b7abb082b66e46d06b24849cddbbd6af
-
SSDEEP
196608:rhHMBGC3PtXtT+Was8xwq1wo9JoYx5JAMdJOnZTG1IvQSaKe6NZOn:r2G0kwuwasMdJOnZKVSaaNZOn
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-20_d49256ff715f5c1eab0e233836adcc2e_luca-stealer_magniber.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-12-20_d49256ff715f5c1eab0e233836adcc2e_luca-stealer_magniber.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2024-12-20_d49256ff715f5c1eab0e233836adcc2e_luca-stealer_magniber
-
Size
9.0MB
-
MD5
d49256ff715f5c1eab0e233836adcc2e
-
SHA1
c173203859e9aa8f6f879c2f261e4be2bcd0b720
-
SHA256
1a9390fbfb16f57e55d4aec702f174de39f03f57ed4c7c999041998c1b06647c
-
SHA512
0a565ef31d18414ea7e04783aae1bd0224119bbd1e5616d64f428be4acf88e028910c523171f51b6a707818c233f38d9b7abb082b66e46d06b24849cddbbd6af
-
SSDEEP
196608:rhHMBGC3PtXtT+Was8xwq1wo9JoYx5JAMdJOnZTG1IvQSaKe6NZOn:r2G0kwuwasMdJOnZKVSaaNZOn
Score10/10-
Xmrig family
-
XMRig Miner payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1