General
-
Target
2025-04-01_f1795a8e111b967491cefe7438f38267_black-basta_icedid_luca-stealer
-
Size
21.8MB
-
Sample
250401-csmz7stry2
-
MD5
f1795a8e111b967491cefe7438f38267
-
SHA1
ec6783287f8fba0a53534b88ad027799f054e023
-
SHA256
3d20d079d777d5c179d709428935d51605d82a8668ac716eb89f8249c46adb8d
-
SHA512
a70a16730a858bf59f0c18274b2251206ab0136a34237447a3b1fa624c1c19a7ff8c431b7352534d739770d5b9674bd043199d1461584bc9366feaeb2e7014b9
-
SSDEEP
49152:XciUvXVc5YlG4V5EXHwCC5hDOng6kpicavOafd4+9mNneuEBELEMjFRwV:sislc5YlG4fnzDOnREoQBe
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-01_f1795a8e111b967491cefe7438f38267_black-basta_icedid_luca-stealer.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
valleyrat_s2
1.0
154.39.239.95:1445
-
campaign_date
2025. 3. 5
Targets
-
-
Target
2025-04-01_f1795a8e111b967491cefe7438f38267_black-basta_icedid_luca-stealer
-
Size
21.8MB
-
MD5
f1795a8e111b967491cefe7438f38267
-
SHA1
ec6783287f8fba0a53534b88ad027799f054e023
-
SHA256
3d20d079d777d5c179d709428935d51605d82a8668ac716eb89f8249c46adb8d
-
SHA512
a70a16730a858bf59f0c18274b2251206ab0136a34237447a3b1fa624c1c19a7ff8c431b7352534d739770d5b9674bd043199d1461584bc9366feaeb2e7014b9
-
SSDEEP
49152:XciUvXVc5YlG4V5EXHwCC5hDOng6kpicavOafd4+9mNneuEBELEMjFRwV:sislc5YlG4fnzDOnREoQBe
-
UAC bypass
-
Valleyrat_s2 family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Checks whether UAC is enabled
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3