General
-
Target
764b1117262d33f0a69b4f4c72fad607b7c71c262f60b9b2b35a21e7f4967786.bin.sample
-
Size
1023KB
-
Sample
241218-n6scmaxqhz
-
MD5
08378cd36fdbf69dba24d14393ad564d
-
SHA1
c698e08ff114499e9fecf39fcbf23f652f1cdad8
-
SHA256
764b1117262d33f0a69b4f4c72fad607b7c71c262f60b9b2b35a21e7f4967786
-
SHA512
ef831fc12ad4831e180c9e5e9babbf1a2d8675a918992fc6f5306447b30e12de63e5034124e31a2d9517db4322e7aaf4a01cecf3239f2c6f6d459358849ef197
-
SSDEEP
12288:jbXTgrBCnMCz5WYgeWYg955/155/UqgFUHx2lvyRJbhLvTcT+sqnhDik2BBD+/rF:jbTgrBCnjzgsKrd7m4+OmMlaT2BZSP2
Static task
static1
Behavioral task
behavioral1
Sample
764b1117262d33f0a69b4f4c72fad607b7c71c262f60b9b2b35a21e7f4967786.bin.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
764b1117262d33f0a69b4f4c72fad607b7c71c262f60b9b2b35a21e7f4967786.bin.dll
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Program Files\instructions_read_me.txt
blackbasta
https://bastad5huzwkepdixedg2gekg7jk22ato24zyllp6lnjx7wdtyctgvyd.onion/
Targets
-
-
Target
764b1117262d33f0a69b4f4c72fad607b7c71c262f60b9b2b35a21e7f4967786.bin.sample
-
Size
1023KB
-
MD5
08378cd36fdbf69dba24d14393ad564d
-
SHA1
c698e08ff114499e9fecf39fcbf23f652f1cdad8
-
SHA256
764b1117262d33f0a69b4f4c72fad607b7c71c262f60b9b2b35a21e7f4967786
-
SHA512
ef831fc12ad4831e180c9e5e9babbf1a2d8675a918992fc6f5306447b30e12de63e5034124e31a2d9517db4322e7aaf4a01cecf3239f2c6f6d459358849ef197
-
SSDEEP
12288:jbXTgrBCnMCz5WYgeWYg955/155/UqgFUHx2lvyRJbhLvTcT+sqnhDik2BBD+/rF:jbTgrBCnjzgsKrd7m4+OmMlaT2BZSP2
Score10/10-
Black Basta
A ransomware family targeting Windows and Linux ESXi first seen in February 2022.
-
Blackbasta family
-
Renames multiple (1573) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-