c:\59\20\engine\98\Open\66\triangle\Period\6\very\5\Heavy\53\71\subject\93Similar.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-18_fcdd0335a473c687f9e0e19e0c3cbfcf_black-basta_elex_luca-stealer.exe
Resource
win10v2004-20250410-en
General
-
Target
2025-04-18_fcdd0335a473c687f9e0e19e0c3cbfcf_black-basta_elex_luca-stealer
-
Size
287KB
-
MD5
fcdd0335a473c687f9e0e19e0c3cbfcf
-
SHA1
57394291714306d93b67b8e666f566bfbb6e5e8a
-
SHA256
13bc210fd00fdb3a96ed3d749be0e6768ad470a86ebc7b6b30e5a0e3b5bdd538
-
SHA512
cb274836e78a9e07d75501890e33da91668233713144a0e25b9605bf0f3060554c2143c5b9e8467b4122b3aaf3e0c8bf2e856bb0725aae1ba2f34c4cb7fedb57
-
SSDEEP
6144:iyGEErqT+7I/FdI2lA4b/Ue7z7vOmVwv7u:iyfErqT+s/FLAUVv1Vy7u
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2025-04-18_fcdd0335a473c687f9e0e19e0c3cbfcf_black-basta_elex_luca-stealer
Files
-
2025-04-18_fcdd0335a473c687f9e0e19e0c3cbfcf_black-basta_elex_luca-stealer.exe windows:6 windows x86 arch:x86
8958581b3ee4dd9d80ebea04fe86bd8d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
Sleep
GetFileTime
GetSystemInfo
GetModuleFileNameA
GetEnvironmentVariableA
GetSystemDirectoryA
GetWindowsDirectoryA
GetFileAttributesA
CopyFileA
MoveFileExA
CloseHandle
DecodePointer
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetFilePointerEx
WriteConsoleW
WaitForMultipleObjects
HeapSize
HeapReAlloc
HeapFree
GetProcessHeap
LCMapStringW
GetStringTypeW
GetFileType
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCurrentProcessId
GetShortPathNameA
HeapQueryInformation
VirtualProtect
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
RtlUnwind
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
EncodePointer
RaiseException
GetStdHandle
WriteFile
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
HeapAlloc
HeapValidate
OutputDebugStringW
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
CreateFileW
ole32
CoInitialize
CoUninitialize
CoRevokeClassObject
OleInitialize
OleUninitialize
OleCreate
wininet
InternetCrackUrlA
InternetOpenA
InternetCloseHandle
InternetConnectA
InternetReadFile
InternetWriteFile
InternetErrorDlg
InternetAttemptConnect
HttpEndRequestA
HttpSendRequestExA
HttpSendRequestA
HttpAddRequestHeadersA
HttpOpenRequestA
InternetSetOptionA
InternetQueryOptionA
InternetQueryDataAvailable
urlmon
URLDownloadToFileA
URLOpenPullStreamA
UrlMkGetSessionOption
CoGetClassObjectFromURL
CoInternetCompareUrl
CoInternetCombineUrl
gpedit
BrowseForGPO
CreateGPOLink
ImportRSoPData
Sections
.text Size: 201KB - Virtual size: 201KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 71KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 1019KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ