General
-
Target
a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7
-
Size
623KB
-
Sample
240528-n4r9vaca46
-
MD5
9dbd19323b253a9758195c8efa72f329
-
SHA1
1661ae91f105b6854ebfbaa47563fce45660cc79
-
SHA256
a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7
-
SHA512
2e34266b691a8041e525037ae67cf65142523c45f01b6da2008a50b452b9664697f86011cdb0daf0510cfea33bd786560bb2d147b06b00779f89199d32552e01
-
SSDEEP
12288:DIkz+rSP5VV3VG7rYyPT+p/VYXMJ8oD536bGIqs7GBvw0QygfmHH:DISj3IXYETQV1XD5VIZ7GOg1n
Static task
static1
Behavioral task
behavioral1
Sample
a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
C:\Program Files (x86)\instructions_read_me.txt
blackbasta
https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion/
Targets
-
-
Target
a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7
-
Size
623KB
-
MD5
9dbd19323b253a9758195c8efa72f329
-
SHA1
1661ae91f105b6854ebfbaa47563fce45660cc79
-
SHA256
a6fbdbf8efe0ea129636bb5b3d6d6faec298272a2afded7e7516f2491844abc7
-
SHA512
2e34266b691a8041e525037ae67cf65142523c45f01b6da2008a50b452b9664697f86011cdb0daf0510cfea33bd786560bb2d147b06b00779f89199d32552e01
-
SSDEEP
12288:DIkz+rSP5VV3VG7rYyPT+p/VYXMJ8oD536bGIqs7GBvw0QygfmHH:DISj3IXYETQV1XD5VIZ7GOg1n
-
Black Basta
A ransomware family targeting Windows and Linux ESXi first seen in February 2022.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (3765) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-