Behavioral task
behavioral1
Sample
2025-04-22_253c6f6b4c69e4302a78a343384eea7c_black-basta_elex_hijackloader_luca-stealer_rhadamanthys_xiaobaminer.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
2025-04-22_253c6f6b4c69e4302a78a343384eea7c_black-basta_elex_hijackloader_luca-stealer_rhadamanthys_xiaobaminer.exe
Resource
win11-20250410-en
General
-
Target
2025-04-22_253c6f6b4c69e4302a78a343384eea7c_black-basta_elex_hijackloader_luca-stealer_rhadamanthys_xiaobaminer
-
Size
14.2MB
-
MD5
253c6f6b4c69e4302a78a343384eea7c
-
SHA1
548697e1c6ec7ac1db84130c2ab28691f66375d0
-
SHA256
17a507bcb1aeedefa0869c7f93cc08b7c63f185aa91602a0c4cc857f8375b7bc
-
SHA512
072288dde7f02ed7357053991049b79009f04420a1353a2b93cc55010cb7bde61ab861719a6ad23940c83dc314a9b1f3d49f72e822308ecc2c33ec59d2c4b918
-
SSDEEP
196608:VoadcIzoadcIzoadcIzoadcIxCyPxP/O/2:VoaOwoaOwoaOwoaO8Px3Z
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2025-04-22_253c6f6b4c69e4302a78a343384eea7c_black-basta_elex_hijackloader_luca-stealer_rhadamanthys_xiaobaminer
Files
-
2025-04-22_253c6f6b4c69e4302a78a343384eea7c_black-basta_elex_hijackloader_luca-stealer_rhadamanthys_xiaobaminer.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: 147KB - Virtual size: 236KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE