General
-
Target
0a8297b274aeab986d6336b395b39b3af1bb00464cf5735d1ecdb506fef9098e
-
Size
849KB
-
Sample
240514-fmb8ascb47
-
MD5
403dee0dd3891459b22a8a37828b66b8
-
SHA1
919c33adb648ce13ee8bd7c11bffbfd836936c00
-
SHA256
0a8297b274aeab986d6336b395b39b3af1bb00464cf5735d1ecdb506fef9098e
-
SHA512
8cab8ca9ff17c404d6e41358804daf0915713ad3e8e690457e2f9aab4014c894fd73e406aad8837ed8409be32315a4a0f3ef41795828d7447fde68c6fe9226f2
-
SSDEEP
24576:TdxKSvB4i4sSnMIsBadfBZz4kIsPP3q7uL+gB+UtcMT:Jvei4sSEad5Zz4kIsPP34uL+gB++cW
Static task
static1
Behavioral task
behavioral1
Sample
0a8297b274aeab986d6336b395b39b3af1bb00464cf5735d1ecdb506fef9098e.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
0a8297b274aeab986d6336b395b39b3af1bb00464cf5735d1ecdb506fef9098e.exe
Resource
win10-20240404-en
Malware Config
Extracted
C:\Program Files (x86)\instructions_read_me.txt
blackbasta
https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion/
Targets
-
-
Target
0a8297b274aeab986d6336b395b39b3af1bb00464cf5735d1ecdb506fef9098e
-
Size
849KB
-
MD5
403dee0dd3891459b22a8a37828b66b8
-
SHA1
919c33adb648ce13ee8bd7c11bffbfd836936c00
-
SHA256
0a8297b274aeab986d6336b395b39b3af1bb00464cf5735d1ecdb506fef9098e
-
SHA512
8cab8ca9ff17c404d6e41358804daf0915713ad3e8e690457e2f9aab4014c894fd73e406aad8837ed8409be32315a4a0f3ef41795828d7447fde68c6fe9226f2
-
SSDEEP
24576:TdxKSvB4i4sSnMIsBadfBZz4kIsPP3q7uL+gB+UtcMT:Jvei4sSEad5Zz4kIsPP34uL+gB++cW
-
Black Basta
A ransomware family targeting Windows and Linux ESXi first seen in February 2022.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (9479) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops desktop.ini file(s)
-