Behavioral task
behavioral1
Sample
2024-12-24_ef628ca0e1024f6a8b0fbc58e4daff3e_avoslocker_luca-stealer_revil.exe
Resource
win7-20240903-en
General
-
Target
2024-12-24_ef628ca0e1024f6a8b0fbc58e4daff3e_avoslocker_luca-stealer_revil
-
Size
6.6MB
-
MD5
ef628ca0e1024f6a8b0fbc58e4daff3e
-
SHA1
26a4cc911de4e036a469747126d5d1fb0577c8a4
-
SHA256
2677a0ac5f6acba48f87867caf4595cf23eba0a7209df0d75ccbb4273981970f
-
SHA512
0023502a3596f8c0b06c2f3d6d694bd607007324142a8f43e91a6b44ef34a0fc94c0e0de78b3eb43905878683223ae6b162bd4a414e904f82a5436a4543456ca
-
SSDEEP
98304:id5sSTT5X7Ra75BftIYWPZrG65gwBUMq:KdJXdapbIGFwBK
Malware Config
Signatures
-
Cryptbot family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-12-24_ef628ca0e1024f6a8b0fbc58e4daff3e_avoslocker_luca-stealer_revil
Files
-
2024-12-24_ef628ca0e1024f6a8b0fbc58e4daff3e_avoslocker_luca-stealer_revil.exe windows:6 windows x86 arch:x86
f97ec411ab12d3c2a370fc27ced08ea9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
QueryPerformanceCounter
QueryPerformanceFrequency
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
GetLastError
FormatMessageA
LoadLibraryExA
SetLastError
GetSystemTime
SystemTimeToFileTime
Sleep
InitializeCriticalSectionAndSpinCount
TryEnterCriticalSection
DeleteCriticalSection
GetSystemTimeAsFileTime
GetTimeZoneInformation
CloseHandle
SetEvent
ResetEvent
CreateMutexW
CreateEventW
FlushFileBuffers
GetTickCount
MapViewOfFile
CreateFileMappingW
WideCharToMultiByte
FreeLibrary
GetProcessHeap
GetCurrentProcessId
GetFileSize
LockFileEx
LocalFree
UnlockFile
HeapDestroy
HeapCompact
HeapAlloc
LoadLibraryW
GetSystemInfo
HeapReAlloc
DeleteFileW
DeleteFileA
WaitForSingleObjectEx
CreateFileA
FlushViewOfFile
OutputDebugStringW
GetFileAttributesExW
GetFileAttributesA
GetDiskFreeSpaceA
FormatMessageW
GetTempPathA
MultiByteToWideChar
HeapSize
HeapValidate
UnmapViewOfFile
GetFileAttributesW
CreateFileW
GetTempPathW
UnlockFileEx
SetEndOfFile
GetFullPathNameA
SetFilePointer
LockFile
OutputDebugStringA
GetDiskFreeSpaceW
WriteFile
GetFullPathNameW
HeapFree
HeapCreate
ReadFile
AreFileApisANSI
GetStdHandle
GetCurrentDirectoryA
GetCurrentDirectoryW
DuplicateHandle
GetCurrentProcess
GetVersionExA
IsDBCSLeadByteEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
InitializeSListHead
GetModuleHandleW
IsDebuggerPresent
GetStartupInfoW
InitializeSRWLock
AcquireSRWLockExclusive
InitializeCriticalSectionEx
EncodePointer
DecodePointer
LCMapStringEx
GetLocaleInfoEx
GetStringTypeW
GetCPInfo
RtlUnwind
RaiseException
InterlockedPushEntrySList
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
GetDriveTypeW
GetFileInformationByHandle
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
SetFilePointerEx
GetConsoleMode
ReadConsoleW
GetConsoleOutputCP
GetFileSizeEx
SetConsoleCtrlHandler
SetStdHandle
FindClose
FindFirstFileExW
FindNextFileW
GetACP
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
WriteConsoleW
ExitProcess
ReleaseSRWLockExclusive
GetProcAddress
GetWindowsDirectoryW
SetCurrentDirectoryW
LoadLibraryA
GetModuleFileNameW
GetModuleFileNameA
IsValidCodePage
SleepEx
MoveFileExA
DeviceIoControl
RemoveDirectoryA
GetFileAttributesExA
CreateDirectoryA
ReadConsoleA
SetConsoleMode
SwitchToFiber
DeleteFiber
CreateFiber
FindFirstFileW
GetEnvironmentVariableW
ConvertFiberToThread
ConvertThreadToFiber
WaitForSingleObject
user32
GetUserObjectInformationW
MessageBoxW
GetProcessWindowStation
MessageBoxA
GetActiveWindow
ws2_32
ioctlsocket
gethostbyname
select
WSAIoctl
WSAGetLastError
WSACleanup
WSAStartup
socket
setsockopt
send
recv
getsockopt
getsockname
connect
closesocket
WSASetLastError
secur32
FreeContextBuffer
InitializeSecurityContextA
FreeCredentialsHandle
DeleteSecurityContext
AcquireCredentialsHandleA
advapi32
CryptGenRandom
RegCloseKey
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
DeregisterEventSource
RegisterEventSourceW
ReportEventW
CryptAcquireContextW
CryptAcquireContextA
CryptEnumProvidersW
CryptSignHashW
CryptDestroyHash
CryptCreateHash
CryptDecrypt
CryptExportKey
CryptGetUserKey
CryptGetProvParam
CryptSetHashParam
CryptDestroyKey
CryptReleaseContext
GetUserNameA
shell32
SHGetFolderPathA
crypt32
CertEnumCertificatesInStore
CertOpenStore
CertDuplicateCertificateContext
CertFreeCertificateContext
CertGetCertificateContextProperty
CertFindCertificateInStore
CertCloseStore
bcrypt
BCryptGenRandom
Sections
.text Size: 4.2MB - Virtual size: 4.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 240KB - Virtual size: 240KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 248KB - Virtual size: 248KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 192KB - Virtual size: 192KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ