General
-
Target
80c6b04296ea1c89e4a58d67403dbe72f98691efb0013443c681225dd32b80ed.bin.sample
-
Size
889KB
-
Sample
241218-n2x3baxpey
-
MD5
4a2c293b5f4df429344538dc9da65ff5
-
SHA1
8e5ddb0c85ea4947c2f5d061beaa282b991496e1
-
SHA256
80c6b04296ea1c89e4a58d67403dbe72f98691efb0013443c681225dd32b80ed
-
SHA512
f786138365f3faf8b24ec3ae2175094ac40420ce0be3cb4376a125277c0ccad9f7a14123ee9ce3068aa29b2112e764372e94c3325b2d8d95f68a22fbcf44c58b
-
SSDEEP
24576:yUZSmCmLcNVcfBC2M03mUNeWqsOGlu5I+lEI:jccfB5mUNeWoGQ5plEI
Static task
static1
Behavioral task
behavioral1
Sample
80c6b04296ea1c89e4a58d67403dbe72f98691efb0013443c681225dd32b80ed.bin.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
80c6b04296ea1c89e4a58d67403dbe72f98691efb0013443c681225dd32b80ed.bin.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Program Files\instructions_read_me.txt
blackbasta
https://bastad5huzwkepdixedg2gekg7jk22ato24zyllp6lnjx7wdtyctgvyd.onion/
Targets
-
-
Target
80c6b04296ea1c89e4a58d67403dbe72f98691efb0013443c681225dd32b80ed.bin.sample
-
Size
889KB
-
MD5
4a2c293b5f4df429344538dc9da65ff5
-
SHA1
8e5ddb0c85ea4947c2f5d061beaa282b991496e1
-
SHA256
80c6b04296ea1c89e4a58d67403dbe72f98691efb0013443c681225dd32b80ed
-
SHA512
f786138365f3faf8b24ec3ae2175094ac40420ce0be3cb4376a125277c0ccad9f7a14123ee9ce3068aa29b2112e764372e94c3325b2d8d95f68a22fbcf44c58b
-
SSDEEP
24576:yUZSmCmLcNVcfBC2M03mUNeWqsOGlu5I+lEI:jccfB5mUNeWoGQ5plEI
-
Black Basta
A ransomware family targeting Windows and Linux ESXi first seen in February 2022.
-
Blackbasta family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (8976) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
1