Behavioral task
behavioral1
Sample
2025-05-02_ba4cb72149f95e29237ceeed16cf5f2c_black-basta_elex_luca-stealer.exe
Resource
win10v2004-20250410-en
General
-
Target
2025-05-02_ba4cb72149f95e29237ceeed16cf5f2c_black-basta_elex_luca-stealer
-
Size
8.3MB
-
MD5
ba4cb72149f95e29237ceeed16cf5f2c
-
SHA1
2f002c6912923d4bc11ac8b392009e414de7e0bb
-
SHA256
cab5015c0365402d482e6d68f8f2384d70c390d1eb6104ee8ba8c461fc13415a
-
SHA512
b0cff24f87cd636e3ca2c5fbd3cead5b58fade69ae425079c3cc6574550a255a02b34af664bc1fe4e7fb695ae3bcc83585965d2acb13ccb367e9c59daeef2afb
-
SSDEEP
49152:hGyqWyWy0GyqWyWyMRPC1eHc785diLvQ8b1gtj:hGyqWyWy0GyqWyWyMRPC1eHL5dGYSW
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 2025-05-02_ba4cb72149f95e29237ceeed16cf5f2c_black-basta_elex_luca-stealer unpack001/out.upx
Files
-
2025-05-02_ba4cb72149f95e29237ceeed16cf5f2c_black-basta_elex_luca-stealer.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 96KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 54KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 124KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pb Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE