C:\BUILD\work\3ec84b7238d5b18a\BUILDS\Release\x86\overseer.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-15_be97d2a18bd4e9eb41f80f3e3a71656a_luca-stealer_magniber.exe
Resource
win7-20241023-en
General
-
Target
2024-11-15_be97d2a18bd4e9eb41f80f3e3a71656a_luca-stealer_magniber
-
Size
5.2MB
-
MD5
be97d2a18bd4e9eb41f80f3e3a71656a
-
SHA1
f181fb8964b4f7be4a69fc196ec9b95c5b575ea2
-
SHA256
fa59119030b7d7291f97ea16728f592d3e2ea1aab62172e0b57a60db818ea082
-
SHA512
170d383ef0418ce3a533487d99ffa8ca47ad843040747bd98a48f73867c57570f7c37429a8c0c92172f14fa902666bfa195d42a2a2cdf838ab01816313135632
-
SSDEEP
98304:SCYMqfuEk+8WwFsBSSUCa9qyr1ijMauCDhg0eUAnMyApx0GXtRnWV:xYMqfuEk+8W0bzJVauCDT0MyApxPjWV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-11-15_be97d2a18bd4e9eb41f80f3e3a71656a_luca-stealer_magniber
Files
-
2024-11-15_be97d2a18bd4e9eb41f80f3e3a71656a_luca-stealer_magniber.exe windows:6 windows x86 arch:x86
be31e91cfe8cf306509b81ff1990de5a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shell32
SHGetFolderPathW
ShellExecuteExW
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
ntdll
NtClose
NtOpenKey
RtlUnwind
RtlNtStatusToDosError
VerSetConditionMask
NtQueryKey
NtDeleteKey
kernel32
CreateProcessW
ReadFile
VerifyVersionInfoW
FileTimeToSystemTime
GetSystemTimeAsFileTime
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteFileW
GetFileInformationByHandle
GetFullPathNameW
OutputDebugStringA
TlsAlloc
TlsGetValue
TlsSetValue
FreeLibrary
CreateEventW
SetEvent
ResetEvent
CreateSemaphoreW
ReleaseSemaphore
GetSystemInfo
GetTickCount
QueryPerformanceFrequency
QueryPerformanceCounter
ExpandEnvironmentStringsW
GetModuleFileNameW
GetFileAttributesW
LoadLibraryExW
GetWindowsDirectoryW
GetSystemDirectoryW
VirtualAlloc
VirtualFree
GlobalMemoryStatusEx
GetExitCodeThread
TlsFree
GetDriveTypeW
K32GetProcessImageFileNameW
SetFileAttributesW
LockFileEx
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
GetFileAttributesExW
FindClose
CreateDirectoryW
GetCurrentDirectoryW
CompareStringW
FindNextFileW
QueryDosDeviceW
GetVolumePathNameW
VirtualAllocExNuma
GetEnvironmentVariableW
GetDateFormatW
GetTimeFormatW
InitializeCriticalSectionAndSpinCount
GetVersion
LockResource
FindResourceExW
SetEnvironmentVariableW
UnlockFileEx
SetFileInformationByHandle
K32GetMappedFileNameW
FindFirstVolumeW
FindNextVolumeW
GetVolumePathNamesForVolumeNameW
FindVolumeClose
GetSystemTimes
RaiseException
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
GetSystemDirectoryA
GetModuleHandleA
LoadLibraryA
MoveFileExA
GetEnvironmentVariableA
SleepEx
CreateFileA
ExpandEnvironmentStringsA
GetWindowsDirectoryA
GetVersionExA
TryAcquireSRWLockExclusive
UpdateProcThreadAttribute
DeleteProcThreadAttributeList
InitializeProcThreadAttributeList
FormatMessageA
WakeConditionVariable
SetFilePointer
GetCurrentThread
GetFileSizeEx
SetFilePointerEx
WriteFile
SetEndOfFile
PeekNamedPipe
GetExitCodeProcess
WaitForSingleObject
FormatMessageW
GetModuleHandleExW
GetProcessHeap
DeleteCriticalSection
HeapDestroy
DecodePointer
HeapAlloc
HeapReAlloc
HeapSize
InitializeCriticalSectionEx
HeapFree
GetCommandLineW
OpenMutexW
GetComputerNameW
GetLocaleInfoA
GetDiskFreeSpaceExW
GetNativeSystemInfo
GetVersionExW
SetLastError
ReleaseMutex
MultiByteToWideChar
OutputDebugStringW
GetCurrentProcessId
GetCurrentThreadId
DeviceIoControl
CopyFileW
MoveFileExW
FlushFileBuffers
CreateFileW
GetCurrentProcess
SetPriorityClass
HeapSetInformation
CreateMutexW
LocalFree
GetProcAddress
SetDllDirectoryW
GetSystemPowerStatus
QueryUnbiasedInterruptTime
SizeofResource
LoadResource
FindResourceW
GetModuleHandleW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GetProcessTimes
WideCharToMultiByte
TerminateProcess
CloseHandle
OpenProcess
GetLastError
Sleep
GetTickCount64
SystemTimeToTzSpecificLocalTime
GetConsoleMode
ReadConsoleW
GetConsoleOutputCP
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetTimeZoneInformation
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetFileType
ExitProcess
GetStdHandle
FreeLibraryAndExitThread
ExitThread
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
WriteConsoleW
GetStringTypeW
CreateThread
InterlockedPushEntrySList
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
InitializeSListHead
IsDebuggerPresent
GetCPInfo
LCMapStringEx
EncodePointer
GetLocaleInfoEx
WaitForSingleObjectEx
CloseThreadpoolWork
SubmitThreadpoolWork
CreateThreadpoolWork
FreeLibraryWhenCallbackReturns
InitOnceComplete
InitOnceBeginInitialize
IsProcessorFeaturePresent
SleepConditionVariableSRW
WakeAllConditionVariable
FindFirstFileExW
user32
LoadStringW
GetClassInfoExW
RegisterClassExW
advapi32
FreeSid
OpenServiceW
QueryServiceStatusEx
CloseServiceHandle
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegCreateKeyExW
RegSetValueExW
RegCloseKey
QueryServiceStatus
SystemFunction036
RegQueryValueExA
RegOpenKeyExA
RegEnumKeyExA
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGetHashParam
CryptAcquireContextA
CryptReleaseContext
CryptGenRandom
CryptAcquireContextW
RegDeleteTreeW
RegDeleteKeyExW
RegEnumKeyW
RegQueryInfoKeyW
RegDeleteValueW
RegQueryValueExW
RegOpenKeyExW
ConvertStringSidToSidW
OpenSCManagerW
EqualSid
LookupAccountSidW
AllocateAndInitializeSid
RevertToSelf
ImpersonateSelf
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenThreadToken
GetTokenInformation
OpenProcessToken
StartServiceW
ControlService
ole32
CoInitializeEx
CoUninitialize
CoCreateInstance
oleaut32
VariantClear
VariantInit
SysAllocString
SysFreeString
bcrypt
BCryptGenRandom
ws2_32
gethostname
ioctlsocket
recv
getsockname
getpeername
recvfrom
bind
htonl
WSAGetLastError
select
__WSAFDIsSet
connect
socket
htons
closesocket
WSACleanup
WSAStartup
WSASetLastError
ntohs
ntohl
WSAWaitForMultipleEvents
WSAResetEvent
WSAEventSelect
WSAEnumNetworkEvents
WSACreateEvent
WSACloseEvent
send
getsockopt
getservbyname
setsockopt
WSAIoctl
crypt32
CertAddCertificateContextToStore
CryptDecodeObjectEx
PFXImportCertStore
CryptStringToBinaryA
CertFreeCertificateContext
CertFindCertificateInStore
CertEnumCertificatesInStore
CertCloseStore
CertFindExtension
CertGetNameStringA
CryptQueryObject
CertCreateCertificateChainEngine
CertFreeCertificateChainEngine
CertGetCertificateChain
CertFreeCertificateChain
CertOpenStore
winhttp
WinHttpCrackUrl
iphlpapi
GetAdaptersAddresses
GetUnicastIpAddressTable
FreeMibTable
GetBestRoute2
shlwapi
PathMatchSpecW
Exports
Exports
asw_process_storage_allocate_connector
asw_process_storage_deallocate_connector
on_avast_dll_unload
onexit_register_connector_avast_2
Sections
.text Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 424KB - Virtual size: 423KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 31KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3.4MB - Virtual size: 3.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ