General

  • Target

    7dbdb73c15410a9d439f49aa0cca0a65c9b5ff8660774892099effa546e943bd.zip

  • Size

    7.7MB

  • Sample

    241227-q8fsqawmaq

  • MD5

    b964d70aacbe4ef7e426bc581c22b242

  • SHA1

    6dee76d5c342cc5bf8da2a737568d877f27945a1

  • SHA256

    77737acf7b607545af8db683f21880bdd1a79c5c17e25a8669a51987586ba7ee

  • SHA512

    231f0a00909eaeef110956c84600f4f543b88d3777177247e1516e86cee2d4272e6c7dc51385bffc8b27039454aa7f69f8c81864abe91b6029cadb8c59c041fb

  • SSDEEP

    196608:EZCwAxQZ021sTzgaJlDy5uRR35/4sdnj4a+iwZveOdX:ebZ0I4zByIR34sdZ+iueOdX

Malware Config

Targets

    • Target

      7dbdb73c15410a9d439f49aa0cca0a65c9b5ff8660774892099effa546e943bd

    • Size

      22.2MB

    • MD5

      0ef0ffbd5cc0c2d10217688c017f3cc1

    • SHA1

      f30d85dd1810bea597642338653142b9f1f14093

    • SHA256

      7dbdb73c15410a9d439f49aa0cca0a65c9b5ff8660774892099effa546e943bd

    • SHA512

      d54573a8ddbc99470c76ab68ff842b1ed009803f0d115eee982080e44b451273f979854569202c6b841b3b7deeaa0ae559c01cdcca655e337e16ada58be82b28

    • SSDEEP

      98304:bQcmbF2xcY2LakGHFA8oMZv1gH7hiS5JRY9gFu9zP3u+dUL+4+f3H4fAaMQGsyhb:bVzcYVkCtdgq5dP3uW023pZl07K

    • Luca Stealer

      Info stealer written in Rust first seen in July 2022.

    • Lucastealer family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks