General
-
Target
7dbdb73c15410a9d439f49aa0cca0a65c9b5ff8660774892099effa546e943bd.zip
-
Size
7.7MB
-
Sample
241227-q8fsqawmaq
-
MD5
b964d70aacbe4ef7e426bc581c22b242
-
SHA1
6dee76d5c342cc5bf8da2a737568d877f27945a1
-
SHA256
77737acf7b607545af8db683f21880bdd1a79c5c17e25a8669a51987586ba7ee
-
SHA512
231f0a00909eaeef110956c84600f4f543b88d3777177247e1516e86cee2d4272e6c7dc51385bffc8b27039454aa7f69f8c81864abe91b6029cadb8c59c041fb
-
SSDEEP
196608:EZCwAxQZ021sTzgaJlDy5uRR35/4sdnj4a+iwZveOdX:ebZ0I4zByIR34sdZ+iueOdX
Static task
static1
Behavioral task
behavioral1
Sample
7dbdb73c15410a9d439f49aa0cca0a65c9b5ff8660774892099effa546e943bd.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
7dbdb73c15410a9d439f49aa0cca0a65c9b5ff8660774892099effa546e943bd.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
7dbdb73c15410a9d439f49aa0cca0a65c9b5ff8660774892099effa546e943bd
-
Size
22.2MB
-
MD5
0ef0ffbd5cc0c2d10217688c017f3cc1
-
SHA1
f30d85dd1810bea597642338653142b9f1f14093
-
SHA256
7dbdb73c15410a9d439f49aa0cca0a65c9b5ff8660774892099effa546e943bd
-
SHA512
d54573a8ddbc99470c76ab68ff842b1ed009803f0d115eee982080e44b451273f979854569202c6b841b3b7deeaa0ae559c01cdcca655e337e16ada58be82b28
-
SSDEEP
98304:bQcmbF2xcY2LakGHFA8oMZv1gH7hiS5JRY9gFu9zP3u+dUL+4+f3H4fAaMQGsyhb:bVzcYVkCtdgq5dP3uW023pZl07K
Score10/10-
Lucastealer family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-