General

  • Target

    2025-03-31_5ad23c8209fd17a66c6e37436f257a91_black-basta_luca-stealer

  • Size

    46.2MB

  • Sample

    250331-bl1r2szxgy

  • MD5

    5ad23c8209fd17a66c6e37436f257a91

  • SHA1

    47afe2053859cf1ebe0f45fa75d0ce77945f89da

  • SHA256

    b0dea552b8e60015ae41b062602655ebca0b310b677c3428126363b0e0a08476

  • SHA512

    cd4dad7b8a37c9e141b4e86cc3b861f5a6250f0c716326b9fe295bc36ce3bf2b42fd9630e47677eac333e02d0358b175007fd0bfd4636836ec4871bec626d3c4

  • SSDEEP

    786432:GVmrjV7eIAtBXcnm0+Hm+vwZW9a3kTxI2Un/Elw4+rTEl4ElUyemgEmtV8r8G:GVmrjV7eIjnP+TYZQaB3Ex+HEpUxkrn

Malware Config

Targets

    • Target

      2025-03-31_5ad23c8209fd17a66c6e37436f257a91_black-basta_luca-stealer

    • Size

      46.2MB

    • MD5

      5ad23c8209fd17a66c6e37436f257a91

    • SHA1

      47afe2053859cf1ebe0f45fa75d0ce77945f89da

    • SHA256

      b0dea552b8e60015ae41b062602655ebca0b310b677c3428126363b0e0a08476

    • SHA512

      cd4dad7b8a37c9e141b4e86cc3b861f5a6250f0c716326b9fe295bc36ce3bf2b42fd9630e47677eac333e02d0358b175007fd0bfd4636836ec4871bec626d3c4

    • SSDEEP

      786432:GVmrjV7eIAtBXcnm0+Hm+vwZW9a3kTxI2Un/Elw4+rTEl4ElUyemgEmtV8r8G:GVmrjV7eIjnP+TYZQaB3Ex+HEpUxkrn

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Banload family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks