Analysis
-
max time kernel
104s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
12/04/2025, 04:41
General
-
Target
2025-04-12_14196d68dd0ba86c495e0ad66097ac3a_amadey_black-basta_elex_luca-stealer_smoke-loader.exe
-
Size
1.1MB
-
MD5
14196d68dd0ba86c495e0ad66097ac3a
-
SHA1
3c90704f1480a9ff18e09d69fedeed0a8f6b80d3
-
SHA256
a222934b1c6c67ebf726df4f5840b3de00f0d6ddfe6cb9f6f6f11e0ae1ea2770
-
SHA512
4ca1627d4a171ed5070019a96dc0fcf078a21309b7d1add1c61c7db95282df03bf1835f19513962565672d298dcd71bf602ed8735931bd154467d6c5eebb798b
-
SSDEEP
24576:rSMR9ShOWpqJ5+CYhJyQt6gfP7ZD+wYUSSUPQ5bzqBDjNrRgjqMvShX:8qgl06yQ5bqjBCjPSZ
Malware Config
Extracted
ffdroider
http://101.36.107.74
Signatures
-
Ffdroider family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4200 3932 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-12_14196d68dd0ba86c495e0ad66097ac3a_amadey_black-basta_elex_luca-stealer_smoke-loader.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 3932 2025-04-12_14196d68dd0ba86c495e0ad66097ac3a_amadey_black-basta_elex_luca-stealer_smoke-loader.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-12_14196d68dd0ba86c495e0ad66097ac3a_amadey_black-basta_elex_luca-stealer_smoke-loader.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-12_14196d68dd0ba86c495e0ad66097ac3a_amadey_black-basta_elex_luca-stealer_smoke-loader.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3932 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3932 -s 12922⤵
- Program crash
PID:4200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3932 -ip 39321⤵PID:5980
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5d3f49f02b667bb7400c23d83acb71851
SHA1b62a02c992d864b199c193158b7df25bd90f9abf
SHA256f1bd2963f27286128a9813a31ecfbb0b7c6d7b1f8ec49ca9a38dfac52e691c90
SHA51263216eee3b833f2fab257f7664c38b1ca2a3dfff3612aba7bc30ac1cb1791db9aadb4abbbb16d42320b78ed9695e7429cf78b2c74a39e6a1c4dcaea84970554f
-
Filesize
16KB
MD58142ec84dfdf467da271ad00674a19bc
SHA184b2ba14edc3ecbd2f564e1e199054bd342dc8e3
SHA256784d689c7d60debd1774dffe59e6fa4aa4cc8d37932d6f9ad1b16f1af3472090
SHA51291ae5553121038db7091be15abff0a0c9b89b605ecb5e6199a68dc99f59026290e3909158273eee392f4cd62c8d7c5b9877e6c7879c850a88207ebe760f8c9af
-
Filesize
16KB
MD5d608eea8afb0c5b50a321506c02cea80
SHA16c694c5e392e13032bfd947e5bf0782f0e2d8da0
SHA256bcb6e842e19a27411e6e9babd3d895745671d23ba92060ce154db63e7fec74bb
SHA51267b8263b7da57e34642a90841400c80dfa98ce8d73a8737285a0dc968c068698c15215a44c53717d83b917458c38c2aac664ad3541d48f5ecee685960c679374
-
Filesize
16KB
MD5ed5c6f9e77344be1be2bc463ff763ea2
SHA1693bcfd91b1038a88b14bad86ad260d7229fdac5
SHA2564ffa5d9da2a2dfbe4c9b7148e0ddb3a58867f6d3ca8a7f7197d4555a1253c147
SHA5128e3cb7a2b5f893038e15c18805656b265fd826514ba7e250390f063306961dea100da324d4b542b5859308d938b1cca59bc5d519a6d187da882af17e434d2ecf