C:\BuildAgent\work\4a73c29f3c4e6ac\downloader\Release\downloader.pdb
Static task
static1
General
-
Target
2025-04-13_0fa0a232e5c68a1c64fcf0fec6dadf16_black-basta_coinminer_elex_hijackloader_luca-stealer
-
Size
358KB
-
MD5
0fa0a232e5c68a1c64fcf0fec6dadf16
-
SHA1
d4ae321af096831447cf116c45bb87aa8357b76d
-
SHA256
3ff2896818be588e3e2624cb57bd8e55fa83014b47efe4a43c8fa74c28599a87
-
SHA512
a67f806b191d19e684a297dd9a37f6a4f23e056d749e443502bd11369a7908fe8f404cb237bbe5dba19a959273b3a2fab1f4e4fb98787374c59c343fe172668d
-
SSDEEP
6144:Hfp18znPaTavhPvnenut3drPAFl3oAOYk22zVstTtsO:Hfp18wihPvncK3iYmkXqhsO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2025-04-13_0fa0a232e5c68a1c64fcf0fec6dadf16_black-basta_coinminer_elex_hijackloader_luca-stealer
Files
-
2025-04-13_0fa0a232e5c68a1c64fcf0fec6dadf16_black-basta_coinminer_elex_hijackloader_luca-stealer.exe windows:5 windows x86 arch:x86
8671a3d963861aab61fe1391c7d8536a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationW
secur32
LsaFreeReturnBuffer
LsaEnumerateLogonSessions
LsaGetLogonSessionData
wininet
InternetSetOptionA
InternetCloseHandle
InternetSetStatusCallbackA
InternetOpenA
InternetOpenUrlA
kernel32
ReadConsoleW
WriteConsoleW
SetStdHandle
SetHandleInformation
GetCommandLineW
GetCurrentProcess
InterlockedDecrement
GetModuleFileNameW
GetTempPathW
WaitForSingleObject
GetVersionExW
Sleep
GetLastError
GetVersionExA
CloseHandle
GetCurrentProcessId
CreateProcessW
GetExitCodeProcess
HeapSize
UnmapViewOfFile
CreateFileMappingW
MapViewOfFile
VirtualQuery
HeapFree
FindClose
DuplicateHandle
MultiByteToWideChar
OutputDebugStringW
HeapAlloc
GetProcessHeap
WideCharToMultiByte
ReadFile
EnumSystemLocalesW
GetUserDefaultLCID
SetEndOfFile
GetModuleHandleExW
SetFilePointerEx
GetStdHandle
CreateFileW
FindFirstFileExW
IsValidLocale
GetConsoleMode
GetConsoleCP
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
ExitProcess
HeapReAlloc
LoadLibraryExW
FreeLibrary
RaiseException
RtlUnwind
GetOEMCP
IsValidCodePage
FindNextFileW
FlushFileBuffers
GetFileType
GetACP
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
GetCPInfo
CompareStringW
LCMapStringW
GetLocaleInfoW
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
GetStringTypeW
LocalFree
SetEvent
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentThreadId
InitializeSListHead
WriteFile
user32
wsprintfW
CharLowerW
advapi32
CopySid
ConvertSidToStringSidW
GetLengthSid
LsaNtStatusToWinError
OpenProcessToken
GetTokenInformation
shell32
SHCreateDirectoryExW
ShellExecuteExW
ole32
CoUninitialize
CoCreateInstance
OleRun
CoCreateGuid
StringFromGUID2
CoInitialize
oleaut32
VariantInit
SysFreeString
SysAllocString
VariantClear
GetErrorInfo
urlmon
URLOpenBlockingStreamW
wintrust
WinVerifyTrust
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
Sections
.text Size: 218KB - Virtual size: 218KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 77KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 1024B - Virtual size: 652B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.zero Size: 4KB - Virtual size: 3KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ