Analysis

  • max time kernel
    72s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/03/2025, 10:13

General

  • Target

    2025-03-30_238eb705d0e40f8bf2e1f15e137e6e91_black-basta_jeefo_luca-stealer.exe

  • Size

    12.0MB

  • MD5

    238eb705d0e40f8bf2e1f15e137e6e91

  • SHA1

    fb3e3d4750a4929d449905a421423248a1b5e020

  • SHA256

    7ff47802a8ac2c0da22a241dcd225a7221fcf1e1cb2d7f2061c0c8a161a572ab

  • SHA512

    c088df76fe18418dc53636628c76fcbb196638b42fde5d83a416e670f130fb50a8827af08d8b4016598684670fb316958bc083f8a66754f70be7e0ec521801d7

  • SSDEEP

    196608:fsTzm9BhLAMYJaSa/dX8374qgdpWY8TGBQWCsTfRWEszrdm5DU/jja3NzkZ+B7eg:fWfJfudUg/aT/B9i1D

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-03-30_238eb705d0e40f8bf2e1f15e137e6e91_black-basta_jeefo_luca-stealer.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-03-30_238eb705d0e40f8bf2e1f15e137e6e91_black-basta_jeefo_luca-stealer.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:4988

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4988-1-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB