C:\vanikata4\ledurab.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-30_1220665f1aea031000e46b1aec1a5c44_black-basta_luca-stealer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-30_1220665f1aea031000e46b1aec1a5c44_black-basta_luca-stealer.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-03-30_1220665f1aea031000e46b1aec1a5c44_black-basta_luca-stealer
-
Size
14.5MB
-
MD5
1220665f1aea031000e46b1aec1a5c44
-
SHA1
77df7ed1471b3845bb5e74a52a416ad058783f7e
-
SHA256
e13dbafcfd8506784a4d05380e0d5becbfcbd3b0933009d584c9acfe3e1fece1
-
SHA512
a5f8b5e5543d925c33d2d37334685e620bf75842740384f9e819d159c3a6d31a3df7e66463b8135bbddd88f00dfce2194145fa74d2e3685cd5625454a97fcccd
-
SSDEEP
3072:x5nbTHQC2mC+vdVWQhHPGyCsPiHMhPxO7rFI7NP6BfGrIHmll9uX4YRrVOVOVOVh:znJjWIvGyCYq/H2Ak5uXa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2025-03-30_1220665f1aea031000e46b1aec1a5c44_black-basta_luca-stealer
Files
-
2025-03-30_1220665f1aea031000e46b1aec1a5c44_black-basta_luca-stealer.exe windows:5 windows x86 arch:x86
cd975eb48fd067841449a115e1435c3d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateDirectoryExA
lstrlenW
GetStdHandle
SetFileTime
GetSystemTimes
FindClose
OpenJobObjectW
lstrcmpA
FreeEnvironmentStringsW
OpenSemaphoreA
VirtualProtect
SetCalendarInfoW
GetFileAttributesExW
ReadConsoleInputA
LoadLibraryA
GlobalAlloc
HeapAlloc
GetDefaultCommConfigW
GetCurrentDirectoryW
GetProcAddress
GetModuleHandleW
GetFileTime
WriteConsoleW
GetSystemDefaultLCID
GetOEMCP
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetCurrentProcess
TerminateProcess
RtlUnwind
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
WriteFile
GetModuleFileNameW
MultiByteToWideChar
WideCharToMultiByte
GetACP
HeapFree
LCMapStringW
DecodePointer
GetFileType
GetStringTypeW
CloseHandle
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
SetStdHandle
GetProcessHeap
RaiseException
HeapSize
HeapReAlloc
GetConsoleCP
GetConsoleMode
SetFilePointerEx
FlushFileBuffers
CreateFileW
user32
IsWinEventHookInstalled
advapi32
RegOpenKeyExW
SetSecurityDescriptorControl
GetSecurityDescriptorControl
Sections
.text Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 157KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14.3MB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ