General

  • Target

    96509da4c19a7242e73ae867aace3f6896d566073f893b4fc96d7f0932b31657.zip

  • Size

    2.6MB

  • Sample

    250126-aw74faxmfq

  • MD5

    b2400d6ad5da4c1c1ba4e32d29d819bf

  • SHA1

    e6d916ca7bdca3c5b9f1991a0717096df03691e3

  • SHA256

    c677da375b82c92e20bef56e12b54b860352be22f0b17e254ed9e2d0f5012f64

  • SHA512

    818cfed25bb9dfd46102edba8bf8a3837f34496dcdf063e6d046cbb4714c07879555c082c127bbd2ee37573574199800c0bd36b463fe489bcb18faedd657f2da

  • SSDEEP

    49152:Vj0HxgR3Fx+Ge18tpkpedIz+XVc0wvGzkssTEUkKvYqxW+O9UtynMgbJB5Vh8:KRO3Fx+50Ie4QW0Ut5wpKAq4+O9UMR3S

Malware Config

Extracted

Family

lucastealer

C2

https://api.telegram.org/bot5445127247:AAG4B4j8lqlaY8ZmuKVv8PhTM8fpz0VhAaM

Targets

    • Target

      96509da4c19a7242e73ae867aace3f6896d566073f893b4fc96d7f0932b31657

    • Size

      5.2MB

    • MD5

      00b9af585316df9f94e8f64bde659da0

    • SHA1

      f7115d3c578a675718497faddc372c0dddd036ba

    • SHA256

      96509da4c19a7242e73ae867aace3f6896d566073f893b4fc96d7f0932b31657

    • SHA512

      da4eb412e5e741349ad6b9dd0d67f73d45acf55113cae2ddff8b6dce7dd6a59764c1902d8e8c0ef96f9975c9aa2add14233abe204a18a0ee841c9d3a63cd54ad

    • SSDEEP

      98304:jsa4sNG78UNfaj3AvNA7zGQBpZchIPCe0s+:Qa4hNijQ+7zGQBpZchIPCe1

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks