General
-
Target
96509da4c19a7242e73ae867aace3f6896d566073f893b4fc96d7f0932b31657.zip
-
Size
2.6MB
-
Sample
250126-aw74faxmfq
-
MD5
b2400d6ad5da4c1c1ba4e32d29d819bf
-
SHA1
e6d916ca7bdca3c5b9f1991a0717096df03691e3
-
SHA256
c677da375b82c92e20bef56e12b54b860352be22f0b17e254ed9e2d0f5012f64
-
SHA512
818cfed25bb9dfd46102edba8bf8a3837f34496dcdf063e6d046cbb4714c07879555c082c127bbd2ee37573574199800c0bd36b463fe489bcb18faedd657f2da
-
SSDEEP
49152:Vj0HxgR3Fx+Ge18tpkpedIz+XVc0wvGzkssTEUkKvYqxW+O9UtynMgbJB5Vh8:KRO3Fx+50Ie4QW0Ut5wpKAq4+O9UMR3S
Behavioral task
behavioral1
Sample
96509da4c19a7242e73ae867aace3f6896d566073f893b4fc96d7f0932b31657.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
96509da4c19a7242e73ae867aace3f6896d566073f893b4fc96d7f0932b31657.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
lucastealer
https://api.telegram.org/bot5445127247:AAG4B4j8lqlaY8ZmuKVv8PhTM8fpz0VhAaM
Targets
-
-
Target
96509da4c19a7242e73ae867aace3f6896d566073f893b4fc96d7f0932b31657
-
Size
5.2MB
-
MD5
00b9af585316df9f94e8f64bde659da0
-
SHA1
f7115d3c578a675718497faddc372c0dddd036ba
-
SHA256
96509da4c19a7242e73ae867aace3f6896d566073f893b4fc96d7f0932b31657
-
SHA512
da4eb412e5e741349ad6b9dd0d67f73d45acf55113cae2ddff8b6dce7dd6a59764c1902d8e8c0ef96f9975c9aa2add14233abe204a18a0ee841c9d3a63cd54ad
-
SSDEEP
98304:jsa4sNG78UNfaj3AvNA7zGQBpZchIPCe0s+:Qa4hNijQ+7zGQBpZchIPCe1
Score7/10-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-