Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2025 01:12
Behavioral task
behavioral1
Sample
2025-01-25_27b2027f92ca66969c3f2449010aba5c_avoslocker_cobalt-strike_luca-stealer.exe
Resource
win7-20240903-en
General
-
Target
2025-01-25_27b2027f92ca66969c3f2449010aba5c_avoslocker_cobalt-strike_luca-stealer.exe
-
Size
270KB
-
MD5
27b2027f92ca66969c3f2449010aba5c
-
SHA1
f4fc8e43ad5d15c3781c7b0812a3663d55c98643
-
SHA256
eca457c7e9258b7526c10dda70afb96f7af73718c19c4ede894cc40e56af77fa
-
SHA512
98c6b55170cedc5b1d27cc8775b1d2acd023d20956767bfe3b96cbe88ceb56abe042d575b66539fe7fb11aa43cf5978a3ce66b60534bb638468fbff4692a4689
-
SSDEEP
6144:tDOnyhORl/hfUStnsjngPq+Ar32coTinSReWYfpuyt4pxdmqxFB:tDIyhORl/pUSNsjngPMr3JoTimYfpuyE
Malware Config
Signatures
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-25_27b2027f92ca66969c3f2449010aba5c_avoslocker_cobalt-strike_luca-stealer.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-01-25_27b2027f92ca66969c3f2449010aba5c_avoslocker_cobalt-strike_luca-stealer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2025-01-25_27b2027f92ca66969c3f2449010aba5c_avoslocker_cobalt-strike_luca-stealer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-25_27b2027f92ca66969c3f2449010aba5c_avoslocker_cobalt-strike_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-25_27b2027f92ca66969c3f2449010aba5c_avoslocker_cobalt-strike_luca-stealer.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:1192
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD551785069ed44d9d91f73ed49e526707c
SHA1c4c6e75406d9a7e0e56357144e1d5128359b5c32
SHA256dad8c77a8593f87349f705381bbafb88f3d5570fdb0ee07aa2fa43fe0ad0e235
SHA512ec0433dd2862f723fa47fcbf9595e8c1a3af4f2e471b2828743998140464c0bca17a0dddd80b5bb7ed7bf02a4f29dc49a873cbf18a5090f3ecc0c8ccdf28dfe5
-
Filesize
2KB
MD589e7ae6a380ec4f6a7e6295e59945ff4
SHA1e5d12920e13a5599acef82a110d8bff75040ec96
SHA256d6c503ccf76290051e7c0e44a5e6f1725fb19a51362a4a41dc4fd0d3a40d2abc
SHA512ad1b8677aab40fe5fa6fa53fe0ec0a758eabfb3fae4f14dc87a5a6f0f5c5ebfed78fa6360229feb6081b31fdf515ea4707b174cd4f70fcdbf358174f2fd3dc60
-
Filesize
7KB
MD53a604ca6a3f57d8f5a0d0dd7bbe2e7ef
SHA1a7c321abed05cbf11a7921d983fec109536dba82
SHA256a2b72dd7c008061aa0c4e841b8fbb08943f880534a46392e3e58e39746f3c96a
SHA5128e5d6f24dbcca285ff4d45449cfc7d194287bb605ee05d0a383e90db46bd106d44a3de4af1db030078da9e9e268340bf433ee6e24014bcaf08ebb7acca7fefb5
-
Filesize
53KB
MD5f205c7dbced32ce990e12a4eabc24df1
SHA1ec5ea70c84ede76ce576282842f0409339477916
SHA256fdca51ced0d8d8c5ef85533a27d9e4b897aae5c7192333ad846a7519e08a7743
SHA512dec926f1c0a7e6029c29aba86627832416763342669f938098b0e703d350218853d586a3909bbd750a450355a18e9fe3b651819b3ca9c3d9f875481c7ccc132f