Analysis Overview
score
1/10
SHA256
dfcf2558482be4a4fb0331eef94c56e56f6f4c2291ccb2115f96b3234435ae18
Threat Level: No (potentially) malicious behavior was detected
The file 2025-07-03_9a989c3c6ec13e7dd9eb9c94a32ce88d_amadey_black-basta_coinminer_elex_floxif_luca-stealer was found to be: No (potentially) malicious behavior was detected.
Malicious Activity Summary
N/A
MITRE ATT&CK
N/A
Analysis: static1
Detonation Overview
Reported
2025-07-03 05:55
Signatures
N/A
Analysis: behavioral1
Detonation Overview
Submitted
2025-07-03 05:55
Reported
2025-07-03 05:57
Platform
win10v2004-20250502-en
Max time kernel
104s
Max time network
136s
Command Line
"C:\Users\Admin\AppData\Local\Temp\2025-07-03_9a989c3c6ec13e7dd9eb9c94a32ce88d_amadey_black-basta_coinminer_elex_floxif_luca-stealer.exe"
Signatures
N/A
Processes
C:\Users\Admin\AppData\Local\Temp\2025-07-03_9a989c3c6ec13e7dd9eb9c94a32ce88d_amadey_black-basta_coinminer_elex_floxif_luca-stealer.exe
"C:\Users\Admin\AppData\Local\Temp\2025-07-03_9a989c3c6ec13e7dd9eb9c94a32ce88d_amadey_black-basta_coinminer_elex_floxif_luca-stealer.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | c.pki.goog | udp |
| GB | 142.250.179.227:80 | c.pki.goog | tcp |
Files
N/A