Overview
overview
10Static
static
100d6c3de5ae...bfc2ef
windows7-x64
10d6c3de5ae...bfc2ef
windows10-1703-x64
10d6c3de5ae...bfc2ef
windows10-2004-x64
10d6c3de5ae...bfc2ef
windows11-21h2-x64
117205c4318...90.exe
windows7-x64
917205c4318...90.exe
windows10-1703-x64
917205c4318...90.exe
windows10-2004-x64
917205c4318...90.exe
windows11-21h2-x64
91cad451ced...7b.exe
windows7-x64
31cad451ced...7b.exe
windows10-1703-x64
31cad451ced...7b.exe
windows10-2004-x64
31cad451ced...7b.exe
windows11-21h2-x64
344369783a8...a86.js
windows7-x64
344369783a8...a86.js
windows10-1703-x64
344369783a8...a86.js
windows10-2004-x64
344369783a8...a86.js
windows11-21h2-x64
37c7acd87b4...78f.js
windows7-x64
37c7acd87b4...78f.js
windows10-1703-x64
37c7acd87b4...78f.js
windows10-2004-x64
37c7acd87b4...78f.js
windows11-21h2-x64
396339a7e87...b8e5be
windows7-x64
196339a7e87...b8e5be
windows10-1703-x64
196339a7e87...b8e5be
windows10-2004-x64
196339a7e87...b8e5be
windows11-21h2-x64
197daa26c59...992.js
windows7-x64
397daa26c59...992.js
windows10-1703-x64
397daa26c59...992.js
windows10-2004-x64
397daa26c59...992.js
windows11-21h2-x64
3ae7c868713...6e.exe
windows7-x64
10ae7c868713...6e.exe
windows10-1703-x64
10ae7c868713...6e.exe
windows10-2004-x64
10ae7c868713...6e.exe
windows11-21h2-x64
10General
-
Target
vt_sample_19213598543.zip
-
Size
1.6MB
-
Sample
241001-rnz7astekr
-
MD5
9c71bf9deccf1d931dde3ac119ad4d56
-
SHA1
4347496a6da4812134a8a8868fa051f93461d7d8
-
SHA256
a24a9896229ca06a180da09f45cc7991be06bf690b6b0276416520d3260d35e5
-
SHA512
f18d9749b70ac8d0ad923cf456d3c81d5049e93e5c34e3f79f5c619474d6346f5d62c0f678134ae0331ea21208150876efd68cf5b4d2826ba1a3e2bb055c2de4
-
SSDEEP
24576:u4DqtZmENHizQZG3Fk9f7vHdy+Z+D5MIoi48A1swgDPl+mKP2iSoKZWa21/f1Yrz:u42HmEBx2y7Xs9DH48L+PVKE1xE08t/
Behavioral task
behavioral1
Sample
0d6c3de5aebbbe85939d7588150edf7b7bdc712fceb6a83d79e65b6f79bfc2ef
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0d6c3de5aebbbe85939d7588150edf7b7bdc712fceb6a83d79e65b6f79bfc2ef
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
0d6c3de5aebbbe85939d7588150edf7b7bdc712fceb6a83d79e65b6f79bfc2ef
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
0d6c3de5aebbbe85939d7588150edf7b7bdc712fceb6a83d79e65b6f79bfc2ef
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
1cad451cedeb9967c790c1671cd2e3482de87e3e802953f28e426642894ceb7b.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
1cad451cedeb9967c790c1671cd2e3482de87e3e802953f28e426642894ceb7b.exe
Resource
win10-20240404-en
Behavioral task
behavioral11
Sample
1cad451cedeb9967c790c1671cd2e3482de87e3e802953f28e426642894ceb7b.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral12
Sample
1cad451cedeb9967c790c1671cd2e3482de87e3e802953f28e426642894ceb7b.exe
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
44369783a819a38909e89449495fb98c3f9ba07dd0d2fa55a24a560a89f21a86.js
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
44369783a819a38909e89449495fb98c3f9ba07dd0d2fa55a24a560a89f21a86.js
Resource
win10-20240404-en
Behavioral task
behavioral15
Sample
44369783a819a38909e89449495fb98c3f9ba07dd0d2fa55a24a560a89f21a86.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral16
Sample
44369783a819a38909e89449495fb98c3f9ba07dd0d2fa55a24a560a89f21a86.js
Resource
win11-20240802-en
Behavioral task
behavioral17
Sample
7c7acd87b47d405da4d6efa2c43599148e12c094970ba198905f0a165d79a78f.js
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
7c7acd87b47d405da4d6efa2c43599148e12c094970ba198905f0a165d79a78f.js
Resource
win10-20240404-en
Behavioral task
behavioral19
Sample
7c7acd87b47d405da4d6efa2c43599148e12c094970ba198905f0a165d79a78f.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral20
Sample
7c7acd87b47d405da4d6efa2c43599148e12c094970ba198905f0a165d79a78f.js
Resource
win11-20240802-en
Behavioral task
behavioral21
Sample
96339a7e87ffce6ced247feb9b4cb7c05b83ca315976a9522155bad726b8e5be
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
96339a7e87ffce6ced247feb9b4cb7c05b83ca315976a9522155bad726b8e5be
Resource
win10-20240404-en
Behavioral task
behavioral23
Sample
96339a7e87ffce6ced247feb9b4cb7c05b83ca315976a9522155bad726b8e5be
Resource
win10v2004-20240802-en
Behavioral task
behavioral24
Sample
96339a7e87ffce6ced247feb9b4cb7c05b83ca315976a9522155bad726b8e5be
Resource
win11-20240802-en
Behavioral task
behavioral25
Sample
97daa26c59e0e151f66872147ccd30dd1815bc6e63ec40c288130c6e8a6ea992.js
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
97daa26c59e0e151f66872147ccd30dd1815bc6e63ec40c288130c6e8a6ea992.js
Resource
win10-20240404-en
Behavioral task
behavioral27
Sample
97daa26c59e0e151f66872147ccd30dd1815bc6e63ec40c288130c6e8a6ea992.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral28
Sample
97daa26c59e0e151f66872147ccd30dd1815bc6e63ec40c288130c6e8a6ea992.js
Resource
win11-20240802-en
Behavioral task
behavioral29
Sample
ae7c868713e1d02b4db60128c651eb1e3f6a33c02544cc4cb57c3aa6c6581b6e.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
ae7c868713e1d02b4db60128c651eb1e3f6a33c02544cc4cb57c3aa6c6581b6e.exe
Resource
win10-20240404-en
Behavioral task
behavioral31
Sample
ae7c868713e1d02b4db60128c651eb1e3f6a33c02544cc4cb57c3aa6c6581b6e.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral32
Sample
ae7c868713e1d02b4db60128c651eb1e3f6a33c02544cc4cb57c3aa6c6581b6e.exe
Resource
win11-20240802-en
Malware Config
Extracted
C:\Program Files\readme.txt
https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion:80/
Targets
-
-
Target
0d6c3de5aebbbe85939d7588150edf7b7bdc712fceb6a83d79e65b6f79bfc2ef
-
Size
216KB
-
MD5
32f17040ddaf3477008d844c8eb98410
-
SHA1
b363e038a6d6326e07a02e7ff99d82852f8ec2d2
-
SHA256
0d6c3de5aebbbe85939d7588150edf7b7bdc712fceb6a83d79e65b6f79bfc2ef
-
SHA512
fb29cbaa35b4d54979e4fd311f46c475443c09154b6150b03a4dbe76ac4f65f4c3a1ce54e7d28ebd7f69a9b50c2efb06a664e42679aebf5e116d74ff5db3d01d
-
SSDEEP
6144:qHxwGbi2dn97rh3akMS2vEUrhsQpN1W4XaOZ/6gpZF7:XG+y97KvDW2N
Score1/10 -
-
-
Target
17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90
-
Size
636KB
-
MD5
267d5c3137d313ce1a86c2f255a835e6
-
SHA1
c7a37c0edeffd23777cca44f9b49076be1bd43e6
-
SHA256
17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90
-
SHA512
9c119a9f973dae77f2cdd6a855ae45c20660aadc5c592f6d06f6360dd0bb5a380d0ed1fcc23c0cb721da70bcca7d32db46181be675bf0587276d35d6da26a31e
-
SSDEEP
12288:aEky5bwpy02iRaeXCP2CIcdoKAXMr+Mr+kJZ4:j02iRaeHPcdo18rTrf6
-
Renames multiple (5399) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Sets desktop wallpaper using registry
-
-
-
Target
1cad451cedeb9967c790c1671cd2e3482de87e3e802953f28e426642894ceb7b
-
Size
1.1MB
-
MD5
1e926369c3207662b9871e780c558177
-
SHA1
8150bfc85a83046aa4df782cefe6d9a1fb3356aa
-
SHA256
1cad451cedeb9967c790c1671cd2e3482de87e3e802953f28e426642894ceb7b
-
SHA512
69a3439259f6b6a5b92c0bd0c0542b648986b363e95db3db5195b3a5b81a7a64c54a87832e51ad3ca091f98890767f0f487f800bdd8c395cba99bd7e66377f33
-
SSDEEP
24576:kaNillzz4yw/iyeTM/oGll9iCFBgN62oUIwvbGaL5gg5YF:oxKM6oi9iX0nUDr5YF
Score3/10 -
-
-
Target
44369783a819a38909e89449495fb98c3f9ba07dd0d2fa55a24a560a89f21a86
-
Size
1KB
-
MD5
26a5a7e71a601be991073c78d513dee3
-
SHA1
4d89f323a89acefc43c312cd0d198066db7ddf34
-
SHA256
44369783a819a38909e89449495fb98c3f9ba07dd0d2fa55a24a560a89f21a86
-
SHA512
b6075715a875fcbbce947260c0d6b7cd9a66145438de0deea75bfbf6e7d801a71cea0ac60f9895856e3f7af492b4d7e83ac140166a4de673c0aa006ce7896896
Score3/10 -
-
-
Target
7c7acd87b47d405da4d6efa2c43599148e12c094970ba198905f0a165d79a78f
-
Size
14KB
-
MD5
e02be0dc614523ddd7a28c9e9d500cff
-
SHA1
a900b33ba9700cf0aece6c2811202253767aa6e2
-
SHA256
7c7acd87b47d405da4d6efa2c43599148e12c094970ba198905f0a165d79a78f
-
SHA512
ae5ec7fa79f81037c43cb72b2e1b393a3198ba5f9f5bd11576eaaefb7806f133e069b4e00f10ee594ddf354df01866e285b3392d225c84418aeef7f0373b5fff
-
SSDEEP
384:XsCFUjcuhdJoyGeCtcBokIC82lgCRWtl3:XsCFUjcuhd6IoFC84gOWT
Score3/10 -
-
-
Target
96339a7e87ffce6ced247feb9b4cb7c05b83ca315976a9522155bad726b8e5be
-
Size
204KB
-
MD5
7688c1b7a1124c1cd9413f4b535b2f44
-
SHA1
8ccac360e2ca37b2fa9f5fa81b22114fb8936120
-
SHA256
96339a7e87ffce6ced247feb9b4cb7c05b83ca315976a9522155bad726b8e5be
-
SHA512
9810c1bf7d58e6a68e9518aebd228b9fd8d589e016722f9418e03b3940b9d36fa7d7c76e64c1924d5f3e8c699a5956868182896968f22f8b2bb9d24dff607916
-
SSDEEP
6144:OUjqtclKpiqKLICZM5cUq29shXs6u7ulx97Z52Gd:fqt4KoVkCm9oV
Score1/10 -
-
-
Target
97daa26c59e0e151f66872147ccd30dd1815bc6e63ec40c288130c6e8a6ea992
-
Size
4KB
-
MD5
64454645a9a21510226ab29e01e76d39
-
SHA1
783d8b32d5a99bfe1367f0709562e36a6b4a042f
-
SHA256
97daa26c59e0e151f66872147ccd30dd1815bc6e63ec40c288130c6e8a6ea992
-
SHA512
87311ba40952d52f9049b6a2ec5f4b96e0a77ce5ebf8e5bcdb851e28d2fd020422e11fe0750a17032ef520d7bf86893696096bd546b0dd3912ba8b9b337f51fe
-
SSDEEP
96:qz8crcCCRgR2R2OKpaiQRCoaiQRMIQHqEsqiq0bQC/B3TT6:w8crcCCRgR2R2lpaiQRCoaiQRLEf9UTe
Score3/10 -
-
-
Target
ae7c868713e1d02b4db60128c651eb1e3f6a33c02544cc4cb57c3aa6c6581b6e
-
Size
543KB
-
MD5
53fdeb923b1890d29b8f29da77995938
-
SHA1
a996ccd0d58125bf299e89f4c03ff37afdab33fc
-
SHA256
ae7c868713e1d02b4db60128c651eb1e3f6a33c02544cc4cb57c3aa6c6581b6e
-
SHA512
7c78e880f3d2dfc163625ff3d0b4676aa6a083dbbeac270520679f6b21d1c449c5af720ca7b9a68b5b3309e2de8d586cfed5d9b3a78d006e6d981a1aaf88c535
-
SSDEEP
12288:M1DTMHixr1moQqUiXINDl/m1s6BQio67VlAU:AzmoQqUiXw2s6yiVxR
-
Black Basta
A ransomware family targeting Windows and Linux ESXi first seen in February 2022.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (6184) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops desktop.ini file(s)
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1JavaScript
1Windows Management Instrumentation
1Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
1