C:\vejedu\cuh.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-04_6c09c1793a9485ddf99bbbf46b9e443b_black-basta_luca-stealer.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-04-04_6c09c1793a9485ddf99bbbf46b9e443b_black-basta_luca-stealer
-
Size
14.7MB
-
MD5
6c09c1793a9485ddf99bbbf46b9e443b
-
SHA1
af6e2515303e6ba3efd5aa6ac11bceb949840fea
-
SHA256
84339e6b93e9977af2f0043f1c2bccad0a29da9233e0239907b7c5f42d0312df
-
SHA512
d36579fc3c034331e9bac0d996f278880ad06463045ae9c6146154ed5ad238a4823275bf3cd529626603907dc20040af6e2a6d30364cbc8d93fcdae47467d76e
-
SSDEEP
12288:BWaQslyPXVhHfUjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjje:YaQNlhHf7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2025-04-04_6c09c1793a9485ddf99bbbf46b9e443b_black-basta_luca-stealer
Files
-
2025-04-04_6c09c1793a9485ddf99bbbf46b9e443b_black-basta_luca-stealer.exe windows:5 windows x86 arch:x86
aeb9daee217e3be82249e7f5282f4c05
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
IsProcessInJob
GetModuleHandleA
GetCalendarInfoW
ReadConsoleInputW
DefineDosDeviceW
GlobalAlloc
DeleteFileW
HeapReAlloc
GetDefaultCommConfigA
LoadLibraryW
HeapAlloc
OpenSemaphoreA
GetProcAddress
GlobalFix
GetProfileStringW
OpenJobObjectA
CreateMailslotA
FreeEnvironmentStringsA
GetFileTime
CreateDirectoryExW
IsBadStringPtrW
WriteConsoleW
FlushFileBuffers
GetPrivateProfileSectionNamesW
lstrcmpA
lstrlenA
GetFirmwareEnvironmentVariableA
FatalExit
LockFile
SetProcessShutdownParameters
DeviceIoControl
EnumResourceTypesW
GetStdHandle
GetSystemDefaultLCID
GetFileAttributesExA
GetCurrentDirectoryW
GetModuleFileNameA
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetCurrentProcess
TerminateProcess
GetLastError
SetLastError
RtlUnwind
RaiseException
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
WriteFile
GetACP
HeapFree
DecodePointer
GetFileType
LCMapStringW
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetProcessHeap
CloseHandle
SetStdHandle
GetStringTypeW
HeapSize
GetConsoleCP
GetConsoleMode
SetFilePointerEx
CreateFileW
user32
IsWinEventHookInstalled
advapi32
GetPrivateObjectSecurity
RegisterServiceCtrlHandlerW
ClearEventLogA
DeleteAce
ObjectPrivilegeAuditAlarmA
AddAccessDeniedAce
GetFileSecurityW
RegOpenKeyExW
RegCreateKeyW
SetSecurityDescriptorControl
RegEnumValueW
RegQueryValueExW
RegQueryValueW
Sections
.text Size: 66KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 98KB - Virtual size: 224KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14.5MB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ