General
-
Target
2025-03-30_ec15dfea584100f62222523ad6de3775_black-basta_hijackloader_luca-stealer
-
Size
16.4MB
-
Sample
250330-jyvesstwbx
-
MD5
ec15dfea584100f62222523ad6de3775
-
SHA1
52bfe277b61dde623cbfdb5a1d6ed1b697d8c3f5
-
SHA256
4c8476851e6edb5511a84c1b243a8ed671f1302ee4e46993ec2ff60cc53b82b1
-
SHA512
130177f0f19bab51d6d2a7f36b3e872622df87cf1b305ebfd9641475f73c8ec3e0ff5a3a60e7d821a2ab8d857e94a5fb57cd01e32bf0abf6f71e9fb58823faa4
-
SSDEEP
393216:pQxDQ7Te43Oumu165sBPzU3WS1C5VyLErOOtMvKLPEwFGS73AKiS1C5VyLErOOt1:pQxDQ/3OdbAzU3WS1CIOOWqk3AZS1CIL
Behavioral task
behavioral1
Sample
2025-03-30_ec15dfea584100f62222523ad6de3775_black-basta_hijackloader_luca-stealer.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
2025-03-30_ec15dfea584100f62222523ad6de3775_black-basta_hijackloader_luca-stealer.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_tcp
192.168.100.168:4445
Targets
-
-
Target
2025-03-30_ec15dfea584100f62222523ad6de3775_black-basta_hijackloader_luca-stealer
-
Size
16.4MB
-
MD5
ec15dfea584100f62222523ad6de3775
-
SHA1
52bfe277b61dde623cbfdb5a1d6ed1b697d8c3f5
-
SHA256
4c8476851e6edb5511a84c1b243a8ed671f1302ee4e46993ec2ff60cc53b82b1
-
SHA512
130177f0f19bab51d6d2a7f36b3e872622df87cf1b305ebfd9641475f73c8ec3e0ff5a3a60e7d821a2ab8d857e94a5fb57cd01e32bf0abf6f71e9fb58823faa4
-
SSDEEP
393216:pQxDQ7Te43Oumu165sBPzU3WS1C5VyLErOOtMvKLPEwFGS73AKiS1C5VyLErOOt1:pQxDQ/3OdbAzU3WS1CIOOWqk3AZS1CIL
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-