General
-
Target
flasher.exe
-
Size
1.4MB
-
Sample
250302-yxjz1attfx
-
MD5
3845ac30b6348d3df03c46ed1e7a257a
-
SHA1
0bb236a415612bc50d9a946812e3083f0c9a4943
-
SHA256
58a6369e06d4f4adeebb3ea78430d7b6882c5a8e7bf0909bd38f63ad311d1149
-
SHA512
51518959e2e1d19baa3482d5e29eef9023b1cd9ff661c0673b571ee93514a2d60bc73dc554d7527b2167c7b8989b16962596ee8216b73975f7093264b164a0ec
-
SSDEEP
24576:Dr5ub/rrvDe7hH3rK67HCU1CkPNlm2/Ubb6I+mGAhC2Kllyv/5nJ7lj9iwGsI:DVub/rrvDehrfTCbi4NXJWA4lypFl0
Behavioral task
behavioral1
Sample
flasher.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
flasher.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
out.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
out.exe
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
flasher.exe
-
Size
1.4MB
-
MD5
3845ac30b6348d3df03c46ed1e7a257a
-
SHA1
0bb236a415612bc50d9a946812e3083f0c9a4943
-
SHA256
58a6369e06d4f4adeebb3ea78430d7b6882c5a8e7bf0909bd38f63ad311d1149
-
SHA512
51518959e2e1d19baa3482d5e29eef9023b1cd9ff661c0673b571ee93514a2d60bc73dc554d7527b2167c7b8989b16962596ee8216b73975f7093264b164a0ec
-
SSDEEP
24576:Dr5ub/rrvDe7hH3rK67HCU1CkPNlm2/Ubb6I+mGAhC2Kllyv/5nJ7lj9iwGsI:DVub/rrvDehrfTCbi4NXJWA4lypFl0
-
Luca Stealer payload
-
Lucastealer family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
-
-
Target
out.upx
-
Size
3.1MB
-
MD5
f3f9aa78f5979d178144b0f3a88265df
-
SHA1
906d3432a692c532262b21633117e57eebeaccde
-
SHA256
e529784d08e44bc12cb1a51e9511559a2b769cbe9aa2716d892f79b5b5949cae
-
SHA512
c01560247c6fc4e625e3913d427b816ecd64d16d32a5bbf01171ed711555744549776235dc6226656491ae9b1714fc797885697e43d897ed6225cc3460b4f42f
-
SSDEEP
49152:WQQWgDHJfQpnZrgbwRGKj42qYg0uGLu8av9Zxm5eaoH:r+HanZvRGKPtgyu39cSH
Score1/10 -