General

  • Target

    Cryptor.exe

  • Size

    1.4MB

  • MD5

    a49364c7ec161533cb4edc7bca0e51c9

  • SHA1

    584f3ef12eae032921ed7d3b9e227996197f1263

  • SHA256

    94e3972742bf6477c34a0f073d6f4885cf8b58742f16aa8308ebffdf8b25763b

  • SHA512

    ac0e8ece98199cd9f776aaa57c508e4bc8baf8286b86f852ab23f305dbcb4e73c7199aaf7a8b24578aecb652c415fe649212fe6666b04a23d298768f48bb013c

  • SSDEEP

    24576:QO3hSzPPakWNlJYcDHO3aDfQ1FTA3zoET2SXqQDGaMeZK+UvB2PRriFLFQo:EWkoYcDuqDIHqT2SVyadU8PRrGLKo

Score
10/10

Malware Config

Signatures

  • Luca Stealer payload 1 IoCs
  • Lucastealer family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • Cryptor.exe
    .exe windows:6 windows x64 arch:x64


    Headers

    Sections

  • out.upx
    .exe windows:6 windows x64 arch:x64


    Headers

    Sections