C:\vejedu\cuh.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-30_43c01bc0cedee20faf232227603380fc_black-basta_luca-stealer.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2025-03-30_43c01bc0cedee20faf232227603380fc_black-basta_luca-stealer.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-03-30_43c01bc0cedee20faf232227603380fc_black-basta_luca-stealer
-
Size
13.6MB
-
MD5
43c01bc0cedee20faf232227603380fc
-
SHA1
10667a4f434d43bb081f9e16305174afd4ab21a7
-
SHA256
847259d4013f05c28589730fb8fb1e0191944c5a2fd76966c9115b7cb3ce1b73
-
SHA512
5c668405cfce9a2ddc87348b5293cc125da2478147d4e826a091d05f2450f3a1db11e5c90884e2178fc96a2720ad1a6499c15229819324e9383d0fcc83faae4d
-
SSDEEP
12288:NWaQslyPXVhHfUjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjN:0aQNlhHfw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2025-03-30_43c01bc0cedee20faf232227603380fc_black-basta_luca-stealer
Files
-
2025-03-30_43c01bc0cedee20faf232227603380fc_black-basta_luca-stealer.exe windows:5 windows x86 arch:x86
aeb9daee217e3be82249e7f5282f4c05
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
IsProcessInJob
GetModuleHandleA
GetCalendarInfoW
ReadConsoleInputW
DefineDosDeviceW
GlobalAlloc
DeleteFileW
HeapReAlloc
GetDefaultCommConfigA
LoadLibraryW
HeapAlloc
OpenSemaphoreA
GetProcAddress
GlobalFix
GetProfileStringW
OpenJobObjectA
CreateMailslotA
FreeEnvironmentStringsA
GetFileTime
CreateDirectoryExW
IsBadStringPtrW
WriteConsoleW
FlushFileBuffers
GetPrivateProfileSectionNamesW
lstrcmpA
lstrlenA
GetFirmwareEnvironmentVariableA
FatalExit
LockFile
SetProcessShutdownParameters
DeviceIoControl
EnumResourceTypesW
GetStdHandle
GetSystemDefaultLCID
GetFileAttributesExA
GetCurrentDirectoryW
GetModuleFileNameA
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetCurrentProcess
TerminateProcess
GetLastError
SetLastError
RtlUnwind
RaiseException
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
WriteFile
GetACP
HeapFree
DecodePointer
GetFileType
LCMapStringW
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetProcessHeap
CloseHandle
SetStdHandle
GetStringTypeW
HeapSize
GetConsoleCP
GetConsoleMode
SetFilePointerEx
CreateFileW
user32
IsWinEventHookInstalled
advapi32
GetPrivateObjectSecurity
RegisterServiceCtrlHandlerW
ClearEventLogA
DeleteAce
ObjectPrivilegeAuditAlarmA
AddAccessDeniedAce
GetFileSecurityW
RegOpenKeyExW
RegCreateKeyW
SetSecurityDescriptorControl
RegEnumValueW
RegQueryValueExW
RegQueryValueW
Sections
.text Size: 66KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 98KB - Virtual size: 224KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13.3MB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ