Static task
static1
General
-
Target
2025-04-04_4c7c9a37b52dd83cabd44e5abfa848e4_amadey_black-basta_luca-stealer_smoke-loader
-
Size
819KB
-
MD5
4c7c9a37b52dd83cabd44e5abfa848e4
-
SHA1
a845f0e388c6a1084e69fae4c1fddab7734b05ed
-
SHA256
8c3c75a9b7f82e0f080da4a1e45f222a18f0b40651ce0a011e7d7fe5601ea35e
-
SHA512
75e7527326be79a91ac9c916e5781758b980b1865d6e4d7c75073e0215258548d5d540275fc333b9c3473fbfade39369823e3ce6b1d08136dc8ba8f845379f4f
-
SSDEEP
24576:7Ze1gOFwHgyMUwxdJvOdIcDa5lKkek29:te1/tyx0JWZDaCkD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2025-04-04_4c7c9a37b52dd83cabd44e5abfa848e4_amadey_black-basta_luca-stealer_smoke-loader
Files
-
2025-04-04_4c7c9a37b52dd83cabd44e5abfa848e4_amadey_black-basta_luca-stealer_smoke-loader.exe windows:5 windows x86 arch:x86
883054685c885d2350f85d2b43acd2f0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentDirectoryW
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetModuleHandleW
GetCurrentProcess
TerminateProcess
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetLastError
ReleaseMutex
CreateMutexW
DecodePointer
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
RaiseException
InitializeCriticalSectionAndSpinCount
GetFileSize
ReadFile
CreateFileW
MultiByteToWideChar
WideCharToMultiByte
GetSystemDirectoryW
GetVolumeInformationW
GetSystemInfo
FormatMessageW
GetVersionExW
GlobalAlloc
GlobalFree
OpenProcess
CreateProcessW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetLongPathNameW
FindClose
lstrcpyW
FindFirstFileW
FindNextFileW
GetTickCount
WriteFile
GetTempPathW
DeleteFileW
CopyFileW
MoveFileExW
GetWindowsDirectoryW
VirtualProtect
SetErrorMode
GetLocalTime
DeviceIoControl
GetFullPathNameW
SetPriorityClass
CreateDirectoryW
VirtualAlloc
VirtualFree
SetLastError
GetNativeSystemInfo
LoadLibraryA
IsBadReadPtr
RtlUnwind
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetStdHandle
GetACP
GetFileType
GetStringTypeW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
OutputDebugStringW
WaitForSingleObjectEx
SetStdHandle
GetConsoleMode
ReadConsoleW
SetFilePointerEx
GetConsoleCP
GetTimeZoneInformation
FlushFileBuffers
WriteConsoleW
SetEndOfFile
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
FreeLibraryAndExitThread
LoadLibraryW
GetProcAddress
FreeLibrary
WritePrivateProfileStringW
GetPrivateProfileStringW
GetPrivateProfileIntW
GetModuleFileNameW
CreateEventW
CloseHandle
Sleep
WaitForSingleObject
SetEvent
GetExitCodeThread
TerminateThread
CreateThread
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
ExitThread
ExpandEnvironmentStringsW
PeekNamedPipe
WaitForMultipleObjects
GetSystemDirectoryA
OutputDebugStringA
InitializeCriticalSection
SleepEx
ResetEvent
shell32
SHGetSpecialFolderPathW
SHGetFolderPathW
shlwapi
PathFileExistsW
PathRemoveFileSpecW
user32
wsprintfW
advapi32
RevertToSelf
RegQueryValueExW
RegOpenKeyW
RegEnumKeyW
RegCreateKeyExW
ImpersonateLoggedOnUser
OpenProcessToken
RegOpenKeyExW
RegCloseKey
DuplicateTokenEx
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
ole32
CoCreateInstance
CoUninitialize
CoInitialize
iphlpapi
GetAdaptersInfo
wininet
InternetOpenW
HttpQueryInfoW
InternetCloseHandle
InternetOpenUrlW
InternetReadFile
InternetSetOptionW
ws2_32
ioctlsocket
gethostname
listen
accept
WSAStartup
WSACleanup
closesocket
socket
WSAGetLastError
recv
send
bind
connect
getpeername
getsockname
getsockopt
htons
ntohs
setsockopt
WSASetLastError
htonl
inet_addr
inet_ntoa
gethostbyaddr
gethostbyname
getservbyport
getservbyname
__WSAFDIsSet
select
recvfrom
sendto
Sections
.text Size: 562KB - Virtual size: 561KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 120KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 7KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 444B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 97KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE