Analysis

  • max time kernel
    103s
  • max time network
    110s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/03/2025, 21:28

General

  • Target

    595fb763e63c59712bc4872255fe54c5d1f54485b9f37f7bddcd34953c2a48d4.exe

  • Size

    15.0MB

  • MD5

    cac2f0aff1e5864d344c9cf462568870

  • SHA1

    6ae7025909a341101b2a4feb119a0b0cfc018248

  • SHA256

    595fb763e63c59712bc4872255fe54c5d1f54485b9f37f7bddcd34953c2a48d4

  • SHA512

    e3c3c4fe19bffde347a0700fcc8089aa79d71296aad5461d9d8680f2a82ab0345f74e40b78151a43a8beec14a0ad5456120ea9f9be348ef2f968553759bf4da5

  • SSDEEP

    196608:o6xEPoQSr+wOjPmllI8qfaOtxSQlDZIYOGfuzZD:o6xEqVOMe15l9VOG8

Malware Config

Extracted

Family

lucastealer

C2

https://discord.com/api/webhooks/1023626463913721926/eLxUNdBgepSiZuOxwWEbYg9gK8OAyGYyC8W0TqKJ_Ey8z2QMkFsr94VtnvlNT-8pbOMc

Signatures

  • Luca Stealer

    Info stealer written in Rust first seen in July 2022.

  • Lucastealer family
  • Themida packer 1 IoCs

    Detects Themida, an advanced Windows software protection system.

Processes

  • C:\Users\Admin\AppData\Local\Temp\595fb763e63c59712bc4872255fe54c5d1f54485b9f37f7bddcd34953c2a48d4.exe
    "C:\Users\Admin\AppData\Local\Temp\595fb763e63c59712bc4872255fe54c5d1f54485b9f37f7bddcd34953c2a48d4.exe"
    1⤵
      PID:5608

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/5608-0-0x00007FF7767A0000-0x00007FF7776A7224-memory.dmp

      Filesize

      15.0MB