General
-
Target
rust-stealer-xss.exe
-
Size
5.4MB
-
Sample
250330-v48p6awjt7
-
MD5
757220d2a9fbe32c7478f27ecbdae5ae
-
SHA1
e9a6822c498731831da6938c25b15a131bf67dfb
-
SHA256
f4f5790a9be596d88822e54ed04b257c529955bd71b49e2e1381b6f0bd8acf57
-
SHA512
fef6d21056aaa768a7ad3558d04d3df9bdcd8dc6911fb397ddc87c4c9a5e756584e8f8d81a19b911440ebfec5b34ca4d57715f559007b4ba9d1b62006a654b94
-
SSDEEP
49152:zTLzKrjyznOLlalYWvQhzQk5GwRgEgfTmcD8LneUqm/G7T251qpbWGAxVRwyjSMH:zjykYWQQfwRYC37Vq2NJsSPPDHn+y
Static task
static1
Behavioral task
behavioral1
Sample
rust-stealer-xss.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
rust-stealer-xss.exe
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
rust-stealer-xss.exe
-
Size
5.4MB
-
MD5
757220d2a9fbe32c7478f27ecbdae5ae
-
SHA1
e9a6822c498731831da6938c25b15a131bf67dfb
-
SHA256
f4f5790a9be596d88822e54ed04b257c529955bd71b49e2e1381b6f0bd8acf57
-
SHA512
fef6d21056aaa768a7ad3558d04d3df9bdcd8dc6911fb397ddc87c4c9a5e756584e8f8d81a19b911440ebfec5b34ca4d57715f559007b4ba9d1b62006a654b94
-
SSDEEP
49152:zTLzKrjyznOLlalYWvQhzQk5GwRgEgfTmcD8LneUqm/G7T251qpbWGAxVRwyjSMH:zjykYWQQfwRYC37Vq2NJsSPPDHn+y
Score10/10-
Lucastealer family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-