Analysis

  • max time kernel
    137s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250619-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250619-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/07/2025, 05:55

General

  • Target

    2025-07-03_9b46dc818d2f96b70951475d9b668c9a_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe

  • Size

    10.2MB

  • MD5

    9b46dc818d2f96b70951475d9b668c9a

  • SHA1

    6dd58b552a3a4d39d48b87720c6cf585cd55d907

  • SHA256

    f8df5267cac1b595adf683c78c611987b1ab447cae151896a96628db19d5346d

  • SHA512

    42a58a29c656463e2da0e4c412ab6309b93345e41a6b1121fcc9a9c0c3c0af28a7ffbc7972c351540753e11f742569c765414f6c50faa29ceb4eebead496b41f

  • SSDEEP

    98304:5R3LZLn2seB5BZm1VVO4xNTEY9xFUkcVwNSHfbv/kaIhThwMlEub:5thgBgvVO4NTx9Pe20/zkaiuMlE

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-07-03_9b46dc818d2f96b70951475d9b668c9a_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-07-03_9b46dc818d2f96b70951475d9b668c9a_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe"
    1⤵
    • Downloads MZ/PE file
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:1820

Network

        MITRE ATT&CK Enterprise v16

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          9KB

          MD5

          e0e68b9a2c0602f3f97eb69a6f3ff1bb

          SHA1

          5d53a90c17f093d63854297e1cd989cda0772028

          SHA256

          a6e47c401a024a0570fb894952105695cacac479e38b249832d5403d8166de01

          SHA512

          320ebd2a226a8f44eec90bbafda132e12f6690742dd614c44279ff78a1a07525a98018beb21b081ad764c82d15dc5e98a984b61e561dfd8b922a8480430f3241

        • C:\Users\Admin\AppData\Roaming\Yandex\ui

          Filesize

          38B

          MD5

          c351e74a1eb8d5893548c8a4f08a393e

          SHA1

          116789f099d729783eb3821005e4628ba511498a

          SHA256

          828e891d3aa39f52bcae08c0b73978b5c66d30ec90e1eff031b4e933230be369

          SHA512

          94a417893159156cf771866aebf6ce07d81025e98d61309a31e526bd01d4243ee778551c0d6415697ed6683da8131b3bfb4747cd47c3c781038e9ba682f3757b