C:\zupec_wez-kimahinerojet fur.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-30_44060047c09b10a66899ce012387c5c3_black-basta_luca-stealer_smoke-loader.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-30_44060047c09b10a66899ce012387c5c3_black-basta_luca-stealer_smoke-loader.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-03-30_44060047c09b10a66899ce012387c5c3_black-basta_luca-stealer_smoke-loader
-
Size
13.9MB
-
MD5
44060047c09b10a66899ce012387c5c3
-
SHA1
d7f0f95a1f168c74dcf2109e280d3da40af6f904
-
SHA256
6542df9290b0e3312e5c6d143461b5258901597514b7cb3aed1280c8271041eb
-
SHA512
d1258de502f4b38d3aee82ab8f978e9593e85f5b222ea05a9558fa1515b5e622daf08b8e936439c274a5c59242ec75c15df63f5d3580afcf56af31c8e73568ae
-
SSDEEP
3072:AZnbTHQC2mC+vdVcQuHAGSr9viHWhPxO796t6B7Aw5S2FxmEBVrVrVrVrVrVrVrb:UnJjcngGSrlqFp6kCyxTT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2025-03-30_44060047c09b10a66899ce012387c5c3_black-basta_luca-stealer_smoke-loader
Files
-
2025-03-30_44060047c09b10a66899ce012387c5c3_black-basta_luca-stealer_smoke-loader.exe windows:5 windows x86 arch:x86
cd975eb48fd067841449a115e1435c3d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateDirectoryExA
lstrlenW
GetStdHandle
SetFileTime
GetSystemTimes
FindClose
OpenJobObjectW
lstrcmpA
FreeEnvironmentStringsW
OpenSemaphoreA
VirtualProtect
SetCalendarInfoW
GetFileAttributesExW
ReadConsoleInputA
LoadLibraryA
GlobalAlloc
HeapAlloc
GetDefaultCommConfigW
GetCurrentDirectoryW
GetProcAddress
GetModuleHandleW
GetFileTime
WriteConsoleW
GetSystemDefaultLCID
GetOEMCP
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetCurrentProcess
TerminateProcess
RtlUnwind
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
WriteFile
GetModuleFileNameW
MultiByteToWideChar
WideCharToMultiByte
GetACP
HeapFree
LCMapStringW
DecodePointer
GetFileType
GetStringTypeW
CloseHandle
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
SetStdHandle
GetProcessHeap
RaiseException
HeapSize
HeapReAlloc
GetConsoleCP
GetConsoleMode
SetFilePointerEx
FlushFileBuffers
CreateFileW
user32
IsWinEventHookInstalled
advapi32
RegOpenKeyExW
SetSecurityDescriptorControl
GetSecurityDescriptorControl
Sections
.text Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 157KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13.7MB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ