Static task
static1
General
-
Target
2025-04-04_7dcdd60c3fa75471fdbcd1a24b0e1eae_amadey_black-basta_luca-stealer_smoke-loader
-
Size
845KB
-
MD5
7dcdd60c3fa75471fdbcd1a24b0e1eae
-
SHA1
96454f95d78c3364fd3159f2e63ec34c41ba3b63
-
SHA256
6a2818d08940ee16eed5601d93d2f0d2d7a3c4a5c28ce750196b1f935fa209e0
-
SHA512
5b024a61adaee9abf647c46a926b9103fbf851fdf2bdcbb063e7585e59d6f8f7eca34e57a9b1ce7d53380c296312599cc89472a0a81519f599130ac148aa15cb
-
SSDEEP
24576:XgPqt4RABSF5Mab/AoLxbskWdcPkvQ7ldBFplM:QPq5qMKbZ6dlKldBFM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2025-04-04_7dcdd60c3fa75471fdbcd1a24b0e1eae_amadey_black-basta_luca-stealer_smoke-loader
Files
-
2025-04-04_7dcdd60c3fa75471fdbcd1a24b0e1eae_amadey_black-basta_luca-stealer_smoke-loader.exe windows:5 windows x86 arch:x86
cc8a773c97269d27f2d523b7501d3559
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFullPathNameW
GetCurrentDirectoryW
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetModuleHandleW
GetCurrentProcess
TerminateProcess
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetLastError
ReleaseMutex
CreateMutexW
DecodePointer
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
RaiseException
InitializeCriticalSectionAndSpinCount
GetFileSize
ReadFile
CreateFileW
MultiByteToWideChar
WideCharToMultiByte
FileTimeToSystemTime
GetSystemDirectoryW
GetVolumeInformationW
GetSystemInfo
FormatMessageW
GetVersionExW
GlobalAlloc
GlobalFree
OpenProcess
CreateProcessW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetLongPathNameW
FindClose
lstrcpyW
FindFirstFileW
FindNextFileW
GetTickCount
WriteFile
GetTempPathW
DeleteFileW
CopyFileW
MoveFileExW
GetWindowsDirectoryW
VirtualProtect
SetErrorMode
LoadLibraryW
GetLocalTime
DeviceIoControl
OutputDebugStringA
SetPriorityClass
CreateDirectoryW
VirtualAlloc
VirtualFree
SetLastError
GetNativeSystemInfo
LoadLibraryA
IsBadReadPtr
RtlUnwind
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetStdHandle
GetACP
GetFileType
GetStringTypeW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
OutputDebugStringW
WaitForSingleObjectEx
SetStdHandle
GetConsoleMode
ReadConsoleW
SetFilePointerEx
GetConsoleCP
GetTimeZoneInformation
FlushFileBuffers
WriteConsoleW
SetEndOfFile
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
FreeLibraryAndExitThread
ExitThread
ExpandEnvironmentStringsW
PeekNamedPipe
WaitForMultipleObjects
GetSystemDirectoryA
SleepEx
GetProcAddress
FreeLibrary
WritePrivateProfileStringW
GetPrivateProfileStringW
GetPrivateProfileIntW
GetModuleFileNameW
CreateEventW
CloseHandle
Sleep
WaitForSingleObject
SetEvent
GetExitCodeThread
TerminateThread
CreateThread
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
ResetEvent
InitializeCriticalSection
shell32
SHGetSpecialFolderPathW
SHGetFolderPathW
shlwapi
PathRemoveFileSpecW
PathFileExistsW
user32
wsprintfW
advapi32
RevertToSelf
RegQueryValueExW
RegOpenKeyExW
RegOpenKeyW
RegEnumKeyW
RegCreateKeyExW
RegCloseKey
ImpersonateLoggedOnUser
OpenProcessToken
DuplicateTokenEx
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
ole32
CoCreateInstance
CoUninitialize
CoInitialize
iphlpapi
GetAdaptersInfo
wininet
HttpQueryInfoW
InternetCloseHandle
InternetOpenUrlW
InternetReadFile
InternetSetOptionW
InternetOpenW
ws2_32
gethostname
ioctlsocket
listen
accept
WSAStartup
WSACleanup
closesocket
socket
WSAGetLastError
recv
send
bind
connect
getpeername
getsockname
getsockopt
htons
ntohs
setsockopt
WSASetLastError
htonl
inet_addr
inet_ntoa
gethostbyaddr
gethostbyname
getservbyport
getservbyname
__WSAFDIsSet
select
recvfrom
sendto
Sections
.text Size: 577KB - Virtual size: 576KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 123KB - Virtual size: 122KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 24KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 444B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 98KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE