C:\hubezasogejoxe33-xatokoy pigewenocusodipatoxa78_zosegi-bakay.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-30_3de725da8507d50f15f93ef660eb5814_black-basta_luca-stealer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-30_3de725da8507d50f15f93ef660eb5814_black-basta_luca-stealer.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-03-30_3de725da8507d50f15f93ef660eb5814_black-basta_luca-stealer
-
Size
11.4MB
-
MD5
3de725da8507d50f15f93ef660eb5814
-
SHA1
a39a126f2fdeccb761ccdf235e0da955abe2c3e4
-
SHA256
beaa88ae783904a89f607a66a75b7a745be7c7d6a631f75c88da18425d0ee411
-
SHA512
4184f19579d62b5b278e46621102f62492b9c28dadd2cbd2762bbc661eb5729ebd1631b2cd0ab7baee85e0c5f7df2cb28a54619ca0fe8a9a1072c25c196054b6
-
SSDEEP
3072:tUbMNIxnynf6ZmHexBK1DQKgrUNjuRCCH+AtUTRM/phZl+H81CCCCCCCCCCCCCCQ:OAN6ynf6tx1ruuRFeAtoRMD6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2025-03-30_3de725da8507d50f15f93ef660eb5814_black-basta_luca-stealer
Files
-
2025-03-30_3de725da8507d50f15f93ef660eb5814_black-basta_luca-stealer.exe windows:5 windows x86 arch:x86
dbdd17cfbf646748cf17041a27a1518b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_SYSTEM
PDB Paths
Imports
kernel32
VirtualProtect
CreateDirectoryExA
lstrlenW
GetStdHandle
GetUserDefaultLangID
GetSystemTimes
FatalExit
FindClose
GetPrivateProfileSectionNamesW
FreeEnvironmentStringsW
GetCurrentDirectoryA
OpenSemaphoreA
GetACP
SetCalendarInfoW
ReadConsoleInputA
DefineDosDeviceA
LoadLibraryA
HeapAlloc
GetProcAddress
OpenJobObjectA
CreateMailslotA
lstrcmpW
GetExitCodeProcess
RaiseException
WriteConsoleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
RtlUnwind
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
WriteFile
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
ExitProcess
GetModuleHandleExW
HeapFree
GetFileType
CloseHandle
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
LCMapStringW
SetStdHandle
GetStringTypeW
GetProcessHeap
HeapSize
HeapReAlloc
GetConsoleCP
GetConsoleMode
SetFilePointerEx
FlushFileBuffers
DecodePointer
CreateFileW
user32
IsWinEventHookInstalled
Sections
.text Size: 66KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 157KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11.3MB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ