General
-
Target
2024-12-25_d17dc248fc4714da1b7dce6987892d02_avoslocker_luca-stealer
-
Size
3.0MB
-
Sample
241225-g73fnazqbj
-
MD5
d17dc248fc4714da1b7dce6987892d02
-
SHA1
803c61130ab5ed2ecba9973cfa9051dc17884128
-
SHA256
78352a58975a346f5c3f9d4056604163234a508d03635a72c76a69a07c7c4300
-
SHA512
1665d3e16ae664b53f1efe5cfe84ecd8a751e22c807bd059108fb6f8fcd0b47b2317231b584c77806c6e685ffcb3e7771d9636f0198cc3eeed4ca3a44dc0dfbd
-
SSDEEP
98304:91BfKEkYUJXqxpsDiSfgFKLT39QI3koVyQg3qL81bjR:cJhy8iSf0K39QIJg3l
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-25_d17dc248fc4714da1b7dce6987892d02_avoslocker_luca-stealer.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-12-25_d17dc248fc4714da1b7dce6987892d02_avoslocker_luca-stealer.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
192.168.119.137:8990
Targets
-
-
Target
2024-12-25_d17dc248fc4714da1b7dce6987892d02_avoslocker_luca-stealer
-
Size
3.0MB
-
MD5
d17dc248fc4714da1b7dce6987892d02
-
SHA1
803c61130ab5ed2ecba9973cfa9051dc17884128
-
SHA256
78352a58975a346f5c3f9d4056604163234a508d03635a72c76a69a07c7c4300
-
SHA512
1665d3e16ae664b53f1efe5cfe84ecd8a751e22c807bd059108fb6f8fcd0b47b2317231b584c77806c6e685ffcb3e7771d9636f0198cc3eeed4ca3a44dc0dfbd
-
SSDEEP
98304:91BfKEkYUJXqxpsDiSfgFKLT39QI3koVyQg3qL81bjR:cJhy8iSf0K39QIJg3l
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1Privilege Escalation
Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1