General
-
Target
Cryptor.exe
-
Size
1.4MB
-
Sample
250224-eevh8s1k17
-
MD5
a49364c7ec161533cb4edc7bca0e51c9
-
SHA1
584f3ef12eae032921ed7d3b9e227996197f1263
-
SHA256
94e3972742bf6477c34a0f073d6f4885cf8b58742f16aa8308ebffdf8b25763b
-
SHA512
ac0e8ece98199cd9f776aaa57c508e4bc8baf8286b86f852ab23f305dbcb4e73c7199aaf7a8b24578aecb652c415fe649212fe6666b04a23d298768f48bb013c
-
SSDEEP
24576:QO3hSzPPakWNlJYcDHO3aDfQ1FTA3zoET2SXqQDGaMeZK+UvB2PRriFLFQo:EWkoYcDuqDIHqT2SVyadU8PRrGLKo
Behavioral task
behavioral1
Sample
Cryptor.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral2
Sample
out.exe
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
Cryptor.exe
-
Size
1.4MB
-
MD5
a49364c7ec161533cb4edc7bca0e51c9
-
SHA1
584f3ef12eae032921ed7d3b9e227996197f1263
-
SHA256
94e3972742bf6477c34a0f073d6f4885cf8b58742f16aa8308ebffdf8b25763b
-
SHA512
ac0e8ece98199cd9f776aaa57c508e4bc8baf8286b86f852ab23f305dbcb4e73c7199aaf7a8b24578aecb652c415fe649212fe6666b04a23d298768f48bb013c
-
SSDEEP
24576:QO3hSzPPakWNlJYcDHO3aDfQ1FTA3zoET2SXqQDGaMeZK+UvB2PRriFLFQo:EWkoYcDuqDIHqT2SVyadU8PRrGLKo
-
Luca Stealer payload
-
Lucastealer family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
-
-
Target
out.upx
-
Size
3.1MB
-
MD5
019cbceda04dcda389e5160dbcf773a7
-
SHA1
ae862c7462a3183504bbc11e6cd0fe09ca82f79d
-
SHA256
56878906a8aba7fb8572fe7c3e7544940b618b1048b9c53bd54f5547c704665b
-
SHA512
faef7c8be01ce719df6c42f62e3c89607cf4307c0a290d5470316fd0b1f32f93ba8d962d16aab35d204dec7eb9d674f335ab75e56c0698202de19149e0144295
-
SSDEEP
49152:BHRFp1/qzQYGNW0i1DigGNfA7E0x12Z9KGmdK4henV57+Dlra7E7qkc:lD/QGEpDigGNf/G37+GxAE7
Score1/10 -