Analysis
-
max time kernel
104s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
14/04/2025, 17:03
Static task
static1
Behavioral task
behavioral1
Sample
rust-stealer-xss.exe
Resource
win10v2004-20250314-en
General
-
Target
rust-stealer-xss.exe
-
Size
5.8MB
-
MD5
fd40ccbd0970b4d71b70e76f5c04446f
-
SHA1
e6f414a578294f2577dac6aa0f81ed05fdd2864d
-
SHA256
1b73e0f63312bea44a3e1977389c269143f872271903cfc2af98d165bbbcea70
-
SHA512
34cf6d74e6875feaa5f730157ebf1d758dce3e67cff119224c1d5a949f761857dab73953b9f5c98dd3b5143401597526550c74c81288172212908743321f2fa1
-
SSDEEP
49152:foV9jFtDhCJo454hxfyEqfHYFHFxQRknnNqaTsvNnhhQ9KJpgoWWWA52a43j9xTY:wDFT/bNqaQS9KJpusKI25Un+hW
Malware Config
Signatures
-
Luca Stealer
Info stealer written in Rust first seen in July 2022.
-
Lucastealer family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: rust-stealer-xss.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 8 ip-api.com -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 116 rust-stealer-xss.exe 116 rust-stealer-xss.exe 116 rust-stealer-xss.exe 116 rust-stealer-xss.exe 116 rust-stealer-xss.exe 116 rust-stealer-xss.exe
Processes
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
802KB
MD5871f9e203587ba2359fc057c50e48e13
SHA179d46eaac1e4b47cbddc556ef9950d44247b55c1
SHA256208d6ea4afdea471f59eda9b9815bc13555c6898cd26182b691f6f527a1d2fa8
SHA51257963b60b1dad3037b33fd43764e4da4080e6f06f73e02573f2ba6aa2dc6c097277ce26b2e8e30a961ee7fbbd1e1545a649efae8cbb6a270cf687c686da4bd42