C:\actions-runner\_work\client\client\host\build\MinSizeRel\host.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-07_9a464d0b1613f0597c367b623f342db7_black-basta_luca-stealer.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-04-07_9a464d0b1613f0597c367b623f342db7_black-basta_luca-stealer
-
Size
2.9MB
-
MD5
9a464d0b1613f0597c367b623f342db7
-
SHA1
86e83432560d18ca33a02415aa80d87444cc2850
-
SHA256
d1cc92f01f3ca958516b590bd94fcee3caebe502dd757f722080957ab0ae0484
-
SHA512
40ac6c4ab5fe4a24c7d537d2113b232851a50931ff0d1b3fee25b8e64e494514e3cf07b3b6e45c9eb7b55b29f6693000d71cb3b22375339e754c708fd5cbdeb3
-
SSDEEP
49152:TGUXgwPbjXOizQmTg8QBoos7BtlC2qRPQzLn9Tw9VnlHE2j/mw0ba9Kyd:TGUXXPvOiEwg82ontlpgPQzLw1mw0bY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2025-04-07_9a464d0b1613f0597c367b623f342db7_black-basta_luca-stealer
Files
-
2025-04-07_9a464d0b1613f0597c367b623f342db7_black-basta_luca-stealer.exe windows:6 windows x86 arch:x86
66667c267abe0bf6ab37bb43b01f4d42
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
dbghelp
SymSetOptions
SymGetLineFromAddr64
SymFromAddr
SymSetSearchPathW
SymGetSearchPathW
SymInitialize
SymCleanup
version
VerQueryValueW
VerQueryValueA
GetFileVersionInfoExW
GetFileVersionInfoSizeExW
GetFileVersionInfoSizeW
GetFileVersionInfoW
winhttp
WinHttpSetStatusCallback
WinHttpOpen
WinHttpCloseHandle
WinHttpGetProxyForUrl
WinHttpGetIEProxyConfigForCurrentUser
kernel32
CreateThread
IsBadReadPtr
FlushInstructionCache
HeapSize
WriteConsoleW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
HeapReAlloc
EnumSystemLocalesW
IsValidLocale
GetLocaleInfoW
LCMapStringW
GetTimeZoneInformation
ReadConsoleW
FreeLibraryAndExitThread
ExitThread
SetStdHandle
GetConsoleMode
GetConsoleOutputCP
GetCurrentProcess
TerminateProcess
GetModuleHandleW
GlobalAlloc
GlobalFree
CompareStringW
DeleteFileW
GetLastError
SetEnvironmentVariableW
VerSetConditionMask
GetCommandLineW
VerifyVersionInfoW
GetFileAttributesW
GetModuleFileNameW
OutputDebugStringA
OutputDebugStringW
GetProcAddress
LoadLibraryExW
LoadLibraryW
FreeLibrary
GetEnvironmentVariableW
GetStdHandle
CreateFileA
CreateFileW
QueryDosDeviceW
WriteFile
IsDebuggerPresent
CloseHandle
HeapAlloc
HeapFree
GetProcessHeap
DeviceIoControl
WaitForSingleObject
GetExitCodeProcess
CreateProcessW
GetProcessId
InitializeProcThreadAttributeList
DeleteProcThreadAttributeList
UpdateProcThreadAttribute
OpenProcess
GlobalMemoryStatusEx
GetSystemDirectoryW
GetWindowsDirectoryW
CreateFileMappingW
MapViewOfFile
FreeResource
GetModuleHandleA
LoadResource
LockResource
SizeofResource
FindResourceW
LocalAlloc
LocalFree
SetThreadExecutionState
MoveFileWithProgressW
AllocConsole
FreeConsole
SetConsoleCtrlHandler
SetConsoleTitleW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
SetCurrentDirectoryW
GetCurrentDirectoryW
CreateDirectoryW
FindClose
FindFirstFileW
FindNextFileW
GetDiskFreeSpaceW
GetFileAttributesExW
GetLongPathNameW
RemoveDirectoryW
SetEndOfFile
SetFileAttributesW
SetFileInformationByHandle
SetFileTime
GetTempPathW
RaiseException
GetOverlappedResult
Sleep
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
SetThreadPriority
GetNativeSystemInfo
VirtualQuery
UnmapViewOfFile
FormatMessageA
CopyFileExW
MoveFileExW
FileTimeToSystemTime
SystemTimeToFileTime
GetFileInformationByHandleEx
GetLocaleInfoEx
ReadFile
SetFilePointerEx
CreateIoCompletionPort
GetQueuedCompletionStatus
PostQueuedCompletionStatus
MulDiv
IsProcessorFeaturePresent
GetTickCount64
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
FlushFileBuffers
SetHandleInformation
CreatePipe
ConnectNamedPipe
DisconnectNamedPipe
PeekNamedPipe
CreateNamedPipeW
WaitNamedPipeW
SetLastError
SetEvent
ResetEvent
CreateEventW
ReleaseSemaphore
OpenSemaphoreW
CreateSemaphoreW
RtlCaptureContext
SetUnhandledExceptionFilter
TerminateThread
VirtualQueryEx
DuplicateHandle
SetNamedPipeHandleState
TransactNamedPipe
WaitForMultipleObjects
HeapSetInformation
SetProcessDEPPolicy
VirtualAllocEx
UnregisterWait
RegisterWaitForSingleObject
TerminateJobObject
GetModuleHandleExW
SetInformationJobObject
GetUserDefaultLangID
GetUserDefaultLCID
GetUserDefaultLocaleName
EnumSystemLocalesEx
HeapDestroy
GetTickCount
GetVersionExW
GetProductInfo
IsWow64Process
TryAcquireSRWLockExclusive
ReleaseSRWLockExclusive
UnregisterWaitEx
GetThreadId
GetThreadPriority
GetFileType
AssignProcessToJobObject
WriteProcessMemory
ReadProcessMemory
GetCurrentProcessorNumber
SetThreadAffinityMask
VirtualFree
GetProcessHeaps
ExpandEnvironmentStringsW
AcquireSRWLockExclusive
GetSystemTimeAsFileTime
QueryPerformanceFrequency
QueryPerformanceCounter
GetLocalTime
CreateJobObjectW
QueryInformationJobObject
VirtualProtectEx
CreateMutexW
VirtualFreeEx
GetProcessHandleCount
TlsGetValue
lstrlenW
DebugBreak
GetFileSizeEx
FindFirstFileExW
TlsAlloc
TlsFree
TlsSetValue
RtlCaptureStackBackTrace
CreateRemoteThread
GetSystemInfo
WideCharToMultiByte
MultiByteToWideChar
ExitProcess
VirtualProtect
LoadLibraryExA
UnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
WaitForSingleObjectEx
GetStartupInfoW
InitializeSListHead
InitializeCriticalSectionEx
EncodePointer
DecodePointer
LCMapStringEx
GetStringTypeW
GetCPInfo
RtlUnwind
Exports
Exports
GetHandleVerifier
GetMainTargetServices
IsSandboxedProcess
Sections
.text Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 326KB - Virtual size: 328KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 25KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 975KB - Virtual size: 974KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ