General
-
Target
2025-04-03_7cbfcf1b8eb95b00a52c8545858247f4_black-basta_hijackloader_luca-stealer
-
Size
5.7MB
-
Sample
250403-mnwfwsvwhx
-
MD5
7cbfcf1b8eb95b00a52c8545858247f4
-
SHA1
144a1e5ef70cc427c9eab0bdbe750029a8b1f311
-
SHA256
6a285a9511a2eea7d847566cfc5b5e2b79d1b8f173d134da7f90f8b6017d2f5d
-
SHA512
b6cb800865689d30ef598d3fc4f21fd838557448dc1b295a8cbdd1282c9b78e4ca120b4f8d27e6ca0194c6ec8c9255c565150e880834f2f9a8dc3001a24d4f68
-
SSDEEP
98304:Qf7l27OuKr+gvhf2U9Nzm31PMoslkqXf0FvUcwti78OqJ7TPBvc8X6Ucze:QiOuK6mn9NzgMoYkSIvUcwti7TQlvcid
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-03_7cbfcf1b8eb95b00a52c8545858247f4_black-basta_hijackloader_luca-stealer.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
gurcu
https://api.telegram.org/bot7451084713:AAHkLbx1R49Iistq5zrYxQyAjPsaNq70hqk/sendDocument?chat_id=7848641603&caption=%F0%9F%93%82%20-%20Browser%20data%0A%E2%94%9C%E2%94%80%E2%94%80%20%F0%9F%93%82%20-%20cookies(2.83%20kb
https://api.telegram.org/bot7451084713:AAHkLbx1R49Iistq5zrYxQyAjPsaNq70hqk/sendMessage?chat_id=7848641603
https://api.telegram.org/bot7451084713:AAHkLbx1R49Iistq5zrYxQyAjPsaNq70hqk/getUpdates?offset=-
https://api.telegram.org/bot7451084713:AAHkLbx1R49Iistq5zrYxQyAjPsaNq70hqk/sendDocument?chat_id=7848641603&caption=%F0%9F%93%B8Screenshot%20take
Targets
-
-
Target
2025-04-03_7cbfcf1b8eb95b00a52c8545858247f4_black-basta_hijackloader_luca-stealer
-
Size
5.7MB
-
MD5
7cbfcf1b8eb95b00a52c8545858247f4
-
SHA1
144a1e5ef70cc427c9eab0bdbe750029a8b1f311
-
SHA256
6a285a9511a2eea7d847566cfc5b5e2b79d1b8f173d134da7f90f8b6017d2f5d
-
SHA512
b6cb800865689d30ef598d3fc4f21fd838557448dc1b295a8cbdd1282c9b78e4ca120b4f8d27e6ca0194c6ec8c9255c565150e880834f2f9a8dc3001a24d4f68
-
SSDEEP
98304:Qf7l27OuKr+gvhf2U9Nzm31PMoslkqXf0FvUcwti78OqJ7TPBvc8X6Ucze:QiOuK6mn9NzgMoYkSIvUcwti7TQlvcid
-
Gurcu family
-
Milleniumrat family
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1