Behavioral task
behavioral1
Sample
2025-03-27_03aa0a86fe8a404ead2373364966ded0_amadey_avoslocker_black-basta_cobalt-strike_luca-stealer.exe
Resource
win7-20250207-en
General
-
Target
2025-03-27_03aa0a86fe8a404ead2373364966ded0_amadey_avoslocker_black-basta_cobalt-strike_luca-stealer
-
Size
272KB
-
MD5
03aa0a86fe8a404ead2373364966ded0
-
SHA1
5b1889c3281e0f011333f8f041559490fad1066d
-
SHA256
d81ca689ec0b219abe2d12b2bc7d6eb1a0c76d8d3fda3ebb58a7bae3061ea200
-
SHA512
545cdc12c5ce65df683b8aa496d8b5ae8fd55b681ca7c6e2b687af672e58dd7353c7f5537636c33dc3a08943319e3b786ba49808dac30b4cd19732463d234174
-
SSDEEP
6144:HMfmQsWFETIG0upECyQTRj9gced0OcO8r27KyODmPZXAf1uytixeqxF:HMfmQshyQTzgced0w8rEKyOkAf1uyti/
Malware Config
Extracted
cryptbot
befqlo52.top
mortos05.top
-
payload_url
http://mincir07.top/download.php?file=lv.exe
Signatures
-
Cryptbot family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2025-03-27_03aa0a86fe8a404ead2373364966ded0_amadey_avoslocker_black-basta_cobalt-strike_luca-stealer
Files
-
2025-03-27_03aa0a86fe8a404ead2373364966ded0_amadey_avoslocker_black-basta_cobalt-strike_luca-stealer.exe windows:6 windows x86 arch:x86
7e5e2f20b4ba05f10dfbbafb0fc9054a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetComputerNameW
GlobalMemoryStatusEx
GetFileSizeEx
UnmapViewOfFile
CreateFileMappingW
MapViewOfFile
ReadFile
WriteFile
SetFilePointer
GetFileInformationByHandle
FileTimeToSystemTime
GetLocalTime
LocalFree
SystemTimeToFileTime
WideCharToMultiByte
GetTickCount
GetPrivateProfileStringW
ExitProcess
SetEndOfFile
WriteConsoleW
HeapReAlloc
HeapSize
FlushFileBuffers
GetStringTypeW
GetUserDefaultLocaleName
GetSystemInfo
CloseHandle
DeleteFileW
FindClose
Sleep
GetFileAttributesW
CreateFileW
LocalAlloc
GetLocaleInfoW
GetFileSize
GetModuleFileNameW
RemoveDirectoryW
FindNextFileW
FindFirstFileW
CreateDirectoryW
CopyFileW
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
MultiByteToWideChar
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetTimeZoneInformation
LCMapStringW
DecodePointer
CompareStringW
GetTimeFormatW
GetDateFormatW
ReadConsoleW
SetStdHandle
ExpandEnvironmentStringsW
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetCurrentProcess
TerminateProcess
RtlUnwind
RaiseException
GetLastError
SetLastError
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
GetModuleHandleExW
GetStdHandle
HeapFree
HeapAlloc
GetFileType
GetConsoleCP
GetConsoleMode
SetFilePointerEx
user32
GetKeyboardLayoutList
GetWindowRect
GetSystemMetrics
GetDesktopWindow
GetWindowDC
gdi32
GetDeviceCaps
BitBlt
SaveDC
SelectObject
CreateDIBSection
CreateCompatibleDC
DeleteDC
RestoreDC
DeleteObject
advapi32
GetUserNameW
RegCloseKey
RegEnumKeyExW
RegOpenKeyExW
RegQueryValueExW
shell32
ShellExecuteW
SHFileOperationW
gdiplus
GdipGetImageEncodersSize
GdipSaveImageToFile
GdipDisposeImage
GdipCreateBitmapFromHBITMAP
GdipCloneImage
GdipGetImageEncoders
GdiplusShutdown
GdiplusStartup
GdipFree
GdipAlloc
wininet
HttpEndRequestW
InternetOpenW
HttpSendRequestExW
HttpAddRequestHeadersA
InternetConnectW
HttpOpenRequestW
InternetWriteFile
urlmon
URLDownloadToFileW
crypt32
CryptUnprotectData
Sections
.text Size: 206KB - Virtual size: 206KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ