General
-
Target
892bb04889678134fbdde62d573eef1274c328b4e216ea7dc17ed0065fe8be37
-
Size
264KB
-
Sample
240417-rhv1dsbc59
-
MD5
a71d04c2747fe7ee42bd4b61704336ee
-
SHA1
849140b6906cb36e3783cb8670d25a959403d17b
-
SHA256
892bb04889678134fbdde62d573eef1274c328b4e216ea7dc17ed0065fe8be37
-
SHA512
14de30f7adb95831fd9c3201401b2f8b17c93e1a0c2dfa6d0f6ecd23585b9a1155e40620c5470e0302635624d631eeb0c5e6c95654ceca0a0d5edc9a54fcd5ce
-
SSDEEP
3072:24L2m+7eL4SOcZ27ZZaxj55VWN87EBK4d5XHN9tUHdohJ4uQq3BGdFWRJkaA2:262m+7CZGWF55bE40pxU9odQqxZJc2
Behavioral task
behavioral1
Sample
ae7c868713e1d02b4db60128c651eb1e3f6a33c02544cc4cb57c3aa6c6581b6e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ae7c868713e1d02b4db60128c651eb1e3f6a33c02544cc4cb57c3aa6c6581b6e.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
C:\Program Files\readme.txt
https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion:80/
Targets
-
-
Target
ae7c868713e1d02b4db60128c651eb1e3f6a33c02544cc4cb57c3aa6c6581b6e.exe
-
Size
543KB
-
MD5
53fdeb923b1890d29b8f29da77995938
-
SHA1
a996ccd0d58125bf299e89f4c03ff37afdab33fc
-
SHA256
ae7c868713e1d02b4db60128c651eb1e3f6a33c02544cc4cb57c3aa6c6581b6e
-
SHA512
7c78e880f3d2dfc163625ff3d0b4676aa6a083dbbeac270520679f6b21d1c449c5af720ca7b9a68b5b3309e2de8d586cfed5d9b3a78d006e6d981a1aaf88c535
-
SSDEEP
12288:M1DTMHixr1moQqUiXINDl/m1s6BQio67VlAU:AzmoQqUiXw2s6yiVxR
Score10/10-
Black Basta
A ransomware family targeting Windows and Linux ESXi first seen in February 2022.
-
Renames multiple (9584) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops desktop.ini file(s)
-
Sets desktop wallpaper using registry
-