General
-
Target
2025-02-06_4dc8cae2cfff6ac862aea48b014937bb_luca-stealer_mespinoza
-
Size
500KB
-
Sample
250206-zkgjsawnhz
-
MD5
4dc8cae2cfff6ac862aea48b014937bb
-
SHA1
80486ca4caa5cb4ce42885dcd66d7a1b4a27d5ce
-
SHA256
ab0774b4ac9eb7e50c82abad03293ae39b668e81712b6ceb0d35ffe7e330881b
-
SHA512
79eb56d858b21743ca565d22bb56cd3d8e4ecfdf462f03124672dca090c95ca51f8908f8dea22c3631dddba0a1a2bf443f41fdf8bf70e826335bcc56d0def47d
-
SSDEEP
12288:YLrjOlAQS+OeO+OeNhBBhhBBYIeVZkD097u8HvaEs1Mm7Q:YLrjSGtVGD05u4yVMm
Behavioral task
behavioral1
Sample
2025-02-06_4dc8cae2cfff6ac862aea48b014937bb_luca-stealer_mespinoza.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-02-06_4dc8cae2cfff6ac862aea48b014937bb_luca-stealer_mespinoza.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Users\Readme.README
http://pysa2bitc5ldeyfak4seeruqymqs4sj5wt5qkcq7aoyg4h2acqieywad.onion/
Targets
-
-
Target
2025-02-06_4dc8cae2cfff6ac862aea48b014937bb_luca-stealer_mespinoza
-
Size
500KB
-
MD5
4dc8cae2cfff6ac862aea48b014937bb
-
SHA1
80486ca4caa5cb4ce42885dcd66d7a1b4a27d5ce
-
SHA256
ab0774b4ac9eb7e50c82abad03293ae39b668e81712b6ceb0d35ffe7e330881b
-
SHA512
79eb56d858b21743ca565d22bb56cd3d8e4ecfdf462f03124672dca090c95ca51f8908f8dea22c3631dddba0a1a2bf443f41fdf8bf70e826335bcc56d0def47d
-
SSDEEP
12288:YLrjOlAQS+OeO+OeNhBBhhBBYIeVZkD097u8HvaEs1Mm7Q:YLrjSGtVGD05u4yVMm
Score10/10-
Mespinoza Ransomware
Also known as Pysa. Ransomware-as-a-servoce which first appeared in 2020.
-
Mespinoza family
-
Renames multiple (2693) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1