Analysis

  • max time kernel
    104s
  • max time network
    131s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250610-en
  • resource tags

    arch:x64arch:x86image:win11-20250610-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    03/07/2025, 05:55

General

  • Target

    2025-07-03_9b46dc818d2f96b70951475d9b668c9a_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe

  • Size

    10.2MB

  • MD5

    9b46dc818d2f96b70951475d9b668c9a

  • SHA1

    6dd58b552a3a4d39d48b87720c6cf585cd55d907

  • SHA256

    f8df5267cac1b595adf683c78c611987b1ab447cae151896a96628db19d5346d

  • SHA512

    42a58a29c656463e2da0e4c412ab6309b93345e41a6b1121fcc9a9c0c3c0af28a7ffbc7972c351540753e11f742569c765414f6c50faa29ceb4eebead496b41f

  • SSDEEP

    98304:5R3LZLn2seB5BZm1VVO4xNTEY9xFUkcVwNSHfbv/kaIhThwMlEub:5thgBgvVO4NTx9Pe20/zkaiuMlE

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-07-03_9b46dc818d2f96b70951475d9b668c9a_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-07-03_9b46dc818d2f96b70951475d9b668c9a_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2868

Network

        MITRE ATT&CK Enterprise v16

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

          Filesize

          9KB

          MD5

          780caa06bc525ca1e7ecb5c3f876680a

          SHA1

          262f26b659a5b2fdf57464cbbd0e97a8b70fb357

          SHA256

          2545040ff0482d4feb6b555ba232c6d8ef200bacfc748210cb93cb94b5fa4be8

          SHA512

          7b14548f969d346bb586b1299ed4c22cd52922f066b847759b1d8c28e0b393e1af3c29357165b74a7d90376c15f7adbec40ace0d8f7f4063742e02f01624c562

        • C:\Users\Admin\AppData\Roaming\Yandex\ui

          Filesize

          38B

          MD5

          1496d6698919f249402fc9c149322de4

          SHA1

          34386141e111a019c42238bc4d90ce192ab73d00

          SHA256

          e096aa0eda1f38c424c94ed2bc78c4f1643463a1b5ef1276ecd58bf5b7418763

          SHA512

          ea33aee8b5f162a74a1be2f8b1939d1c016794a8b6a70f844ec92e5d7c179ccbde0305b17b633a50a55b12ee23a94b7d67dbfa2338b3f418bb64c35bc98d351a