C:\zupec_wez-kimahinerojet fur.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-30_5710a1f1113593d7f17cf60dab5cd8d9_black-basta_luca-stealer_smoke-loader.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
2025-03-30_5710a1f1113593d7f17cf60dab5cd8d9_black-basta_luca-stealer_smoke-loader.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-03-30_5710a1f1113593d7f17cf60dab5cd8d9_black-basta_luca-stealer_smoke-loader
-
Size
10.9MB
-
MD5
5710a1f1113593d7f17cf60dab5cd8d9
-
SHA1
2c93853e7ba2a12eb705c140f9477a1860ea2700
-
SHA256
d16cb42179c40020d71bfae3bc76583874fc9908cb5edc699b5797263f29ba69
-
SHA512
f9a98100ced7072a525dca95ce2fb2318284fe9be24da6189761e09129882846376ef137eaeff4938740abfdcd0d53d473db90913e6ff2c56b8c768e5a2a761b
-
SSDEEP
3072:XZnbTHQC2mC+vdVcQuHAGSr9viHWhPxO796t6B7Aw5S2FxmEBVrVrVrVrVrVrVrS:pnJjcngGSrlqFp6kCyxTa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2025-03-30_5710a1f1113593d7f17cf60dab5cd8d9_black-basta_luca-stealer_smoke-loader
Files
-
2025-03-30_5710a1f1113593d7f17cf60dab5cd8d9_black-basta_luca-stealer_smoke-loader.exe windows:5 windows x86 arch:x86
cd975eb48fd067841449a115e1435c3d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateDirectoryExA
lstrlenW
GetStdHandle
SetFileTime
GetSystemTimes
FindClose
OpenJobObjectW
lstrcmpA
FreeEnvironmentStringsW
OpenSemaphoreA
VirtualProtect
SetCalendarInfoW
GetFileAttributesExW
ReadConsoleInputA
LoadLibraryA
GlobalAlloc
HeapAlloc
GetDefaultCommConfigW
GetCurrentDirectoryW
GetProcAddress
GetModuleHandleW
GetFileTime
WriteConsoleW
GetSystemDefaultLCID
GetOEMCP
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetCurrentProcess
TerminateProcess
RtlUnwind
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
WriteFile
GetModuleFileNameW
MultiByteToWideChar
WideCharToMultiByte
GetACP
HeapFree
LCMapStringW
DecodePointer
GetFileType
GetStringTypeW
CloseHandle
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
SetStdHandle
GetProcessHeap
RaiseException
HeapSize
HeapReAlloc
GetConsoleCP
GetConsoleMode
SetFilePointerEx
FlushFileBuffers
CreateFileW
user32
IsWinEventHookInstalled
advapi32
RegOpenKeyExW
SetSecurityDescriptorControl
GetSecurityDescriptorControl
Sections
.text Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 157KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10.8MB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ