C:\jagovazupep_dokiyanosep28\kat.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-31_87c0a988a2cc0f609e9c4c5ec6c09135_black-basta_luca-stealer.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-03-31_87c0a988a2cc0f609e9c4c5ec6c09135_black-basta_luca-stealer
-
Size
14.7MB
-
MD5
87c0a988a2cc0f609e9c4c5ec6c09135
-
SHA1
983e99278ad072ab5fdb2555870110417ad93da4
-
SHA256
09786ee13ab212d77fc3d7a11b73694e87403851bc5ee418bd5251043fe9fc38
-
SHA512
b95651e026b5a6de9d67c60e85e06f5dee88b166edce2f02437c083998ef74ff3611cd3fb2c2cba3651303586d8c89688129b88fb4a14d537131f82eae48cb67
-
SSDEEP
6144:5f0DpcGWwuzeuCkzdJk0aXILjkXDev7D9+Fy3HOpYlHn5eyc4+uK1:5fYcGWtpaXIcSvQ1GHnxzj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2025-03-31_87c0a988a2cc0f609e9c4c5ec6c09135_black-basta_luca-stealer
Files
-
2025-03-31_87c0a988a2cc0f609e9c4c5ec6c09135_black-basta_luca-stealer.exe windows:5 windows x86 arch:x86
f04f1bf338083d3ebcfa5f42396abe5c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
PDB Paths
Imports
kernel32
VirtualProtect
CreateDirectoryExA
lstrlenW
GetStdHandle
GetSystemTimes
lstrcmpA
GetPrivateProfileSectionNamesW
GetCurrentDirectoryA
LoadLibraryA
OpenSemaphoreW
HeapAlloc
SetCalendarInfoA
GetProcAddress
OpenJobObjectA
CreateMailslotA
FreeEnvironmentStringsA
GetExitCodeProcess
SetFilePointerEx
GetConsoleMode
GetFileSizeEx
DefineDosDeviceA
GetOEMCP
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
GetCurrentProcess
TerminateProcess
EncodePointer
RaiseException
GetLastError
RtlUnwind
FreeLibrary
LoadLibraryExW
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleExW
ExitProcess
MultiByteToWideChar
WideCharToMultiByte
HeapValidate
GetSystemInfo
WriteFile
GetACP
DecodePointer
LCMapStringW
GetFileType
OutputDebugStringA
OutputDebugStringW
WriteConsoleW
CloseHandle
WaitForSingleObjectEx
CreateThread
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetProcessHeap
HeapFree
HeapReAlloc
HeapSize
HeapQueryInformation
SetStdHandle
GetStringTypeW
FlushFileBuffers
GetConsoleCP
CreateFileW
user32
GetMonitorInfoW
advapi32
AddAccessDeniedAce
RegQueryValueA
Sections
.text Size: 198KB - Virtual size: 197KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 47.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 308B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 51KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14.3MB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ