General
-
Target
350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd
-
Size
737KB
-
Sample
240514-fmhebacb57
-
MD5
0bf7bc20496143a9f028e77ab47b4698
-
SHA1
aa54013aeb502b4a936331deb76a6411f1f1ade7
-
SHA256
350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd
-
SHA512
5e94cd77c4ad6dfa1064915ca0f4d117a2e3a4e924d05a16df0b223a5a0cbcb6124627e41d184aa0584f3ff3bbd5f9f913964887c7eb140e105317d4f5709981
-
SSDEEP
12288:bO+sm75a7DI9Mv53VI/XfaUs442JbV24chSS1i2wZbDFMMWzVFq:rh75a7M9S3VYa4npY4cFM2MWhY
Static task
static1
Behavioral task
behavioral1
Sample
350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe
Resource
win10-20240404-en
Malware Config
Extracted
C:\Program Files (x86)\instructions_read_me.txt
blackbasta
https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion/
Targets
-
-
Target
350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd
-
Size
737KB
-
MD5
0bf7bc20496143a9f028e77ab47b4698
-
SHA1
aa54013aeb502b4a936331deb76a6411f1f1ade7
-
SHA256
350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd
-
SHA512
5e94cd77c4ad6dfa1064915ca0f4d117a2e3a4e924d05a16df0b223a5a0cbcb6124627e41d184aa0584f3ff3bbd5f9f913964887c7eb140e105317d4f5709981
-
SSDEEP
12288:bO+sm75a7DI9Mv53VI/XfaUs442JbV24chSS1i2wZbDFMMWzVFq:rh75a7M9S3VYa4npY4cFM2MWhY
-
Black Basta
A ransomware family targeting Windows and Linux ESXi first seen in February 2022.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (9508) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops desktop.ini file(s)
-