Analysis
-
max time kernel
137s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20250619-en -
resource tags
arch:x64arch:x86image:win10v2004-20250619-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2025, 05:55
Static task
static1
Behavioral task
behavioral1
Sample
2025-07-03_9b46dc818d2f96b70951475d9b668c9a_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe
Resource
win10v2004-20250619-en
Behavioral task
behavioral2
Sample
2025-07-03_9b46dc818d2f96b70951475d9b668c9a_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe
Resource
win11-20250610-en
General
-
Target
2025-07-03_9b46dc818d2f96b70951475d9b668c9a_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe
-
Size
10.2MB
-
MD5
9b46dc818d2f96b70951475d9b668c9a
-
SHA1
6dd58b552a3a4d39d48b87720c6cf585cd55d907
-
SHA256
f8df5267cac1b595adf683c78c611987b1ab447cae151896a96628db19d5346d
-
SHA512
42a58a29c656463e2da0e4c412ab6309b93345e41a6b1121fcc9a9c0c3c0af28a7ffbc7972c351540753e11f742569c765414f6c50faa29ceb4eebead496b41f
-
SSDEEP
98304:5R3LZLn2seB5BZm1VVO4xNTEY9xFUkcVwNSHfbv/kaIhThwMlEub:5thgBgvVO4NTx9Pe20/zkaiuMlE
Malware Config
Signatures
-
Downloads MZ/PE file 1 IoCs
flow pid Process 41 1820 2025-07-03_9b46dc818d2f96b70951475d9b668c9a_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-07-03_9b46dc818d2f96b70951475d9b668c9a_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1820 2025-07-03_9b46dc818d2f96b70951475d9b668c9a_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-07-03_9b46dc818d2f96b70951475d9b668c9a_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-07-03_9b46dc818d2f96b70951475d9b668c9a_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe"1⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1820
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5e0e68b9a2c0602f3f97eb69a6f3ff1bb
SHA15d53a90c17f093d63854297e1cd989cda0772028
SHA256a6e47c401a024a0570fb894952105695cacac479e38b249832d5403d8166de01
SHA512320ebd2a226a8f44eec90bbafda132e12f6690742dd614c44279ff78a1a07525a98018beb21b081ad764c82d15dc5e98a984b61e561dfd8b922a8480430f3241
-
Filesize
38B
MD5c351e74a1eb8d5893548c8a4f08a393e
SHA1116789f099d729783eb3821005e4628ba511498a
SHA256828e891d3aa39f52bcae08c0b73978b5c66d30ec90e1eff031b4e933230be369
SHA51294a417893159156cf771866aebf6ce07d81025e98d61309a31e526bd01d4243ee778551c0d6415697ed6683da8131b3bfb4747cd47c3c781038e9ba682f3757b