C:\vanikata4\ledurab.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-30_49fd5c071e54639f9f2aa0215218a542_black-basta_luca-stealer.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2025-03-30_49fd5c071e54639f9f2aa0215218a542_black-basta_luca-stealer.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-03-30_49fd5c071e54639f9f2aa0215218a542_black-basta_luca-stealer
-
Size
12.0MB
-
MD5
49fd5c071e54639f9f2aa0215218a542
-
SHA1
30c64c379a44fef501309c2ee948374cf68863e6
-
SHA256
c0919826b38eb237c7bd2bd2c99a56131c143186aea9f3809dbbdc1eb222077b
-
SHA512
3c6c25b1a57cb74fa0ea9fd11c7df699866a23215938d37ff1eff7d5cdb67fe9cccba6d0bcbfd9064acf51702566fbe09f52cead7e0c94d4eb13d45c86aec874
-
SSDEEP
3072:z5nbTHQC2mC+vdVWQhHPGyCsPiHMhPxO7rFI7NP6BfGrIHmll9uX4YRrVOVOVOVn:NnJjWIvGyCYq/H2Ak5uX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2025-03-30_49fd5c071e54639f9f2aa0215218a542_black-basta_luca-stealer
Files
-
2025-03-30_49fd5c071e54639f9f2aa0215218a542_black-basta_luca-stealer.exe windows:5 windows x86 arch:x86
cd975eb48fd067841449a115e1435c3d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateDirectoryExA
lstrlenW
GetStdHandle
SetFileTime
GetSystemTimes
FindClose
OpenJobObjectW
lstrcmpA
FreeEnvironmentStringsW
OpenSemaphoreA
VirtualProtect
SetCalendarInfoW
GetFileAttributesExW
ReadConsoleInputA
LoadLibraryA
GlobalAlloc
HeapAlloc
GetDefaultCommConfigW
GetCurrentDirectoryW
GetProcAddress
GetModuleHandleW
GetFileTime
WriteConsoleW
GetSystemDefaultLCID
GetOEMCP
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetCurrentProcess
TerminateProcess
RtlUnwind
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
WriteFile
GetModuleFileNameW
MultiByteToWideChar
WideCharToMultiByte
GetACP
HeapFree
LCMapStringW
DecodePointer
GetFileType
GetStringTypeW
CloseHandle
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
SetStdHandle
GetProcessHeap
RaiseException
HeapSize
HeapReAlloc
GetConsoleCP
GetConsoleMode
SetFilePointerEx
FlushFileBuffers
CreateFileW
user32
IsWinEventHookInstalled
advapi32
RegOpenKeyExW
SetSecurityDescriptorControl
GetSecurityDescriptorControl
Sections
.text Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 157KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11.8MB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ