General
-
Target
5549e8943fcb60643dc032765675bc486cb7f2f2603d8399ae3946df08b0be84.bin.sample
-
Size
828KB
-
Sample
241218-np26haykek
-
MD5
c6fc90e5ff451a319ca1cb857ffd3800
-
SHA1
21912a61a881ab758f2e176f93ab64ca446951ca
-
SHA256
5549e8943fcb60643dc032765675bc486cb7f2f2603d8399ae3946df08b0be84
-
SHA512
8a79174ca59a8c53d6f5e820f068abb9e2afa24c1f47ac46fc5325a9b612e1365711373eb34fe55141cc65adc560712296b03facc6cf2d6408059d28e6e6f5f3
-
SSDEEP
12288:4FTfM3+OeO+OeNhBBhhBBd1hzUGvXWoCwUA39w0b6lSydVuYMuOBb70BszJo1Wbz:41f71VXUA39w0b4SydVVGkUJo4OnLs
Static task
static1
Behavioral task
behavioral1
Sample
5549e8943fcb60643dc032765675bc486cb7f2f2603d8399ae3946df08b0be84.bin.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
5549e8943fcb60643dc032765675bc486cb7f2f2603d8399ae3946df08b0be84.bin.dll
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Program Files\instructions_read_me.txt
blackbasta
https://bastad5huzwkepdixedg2gekg7jk22ato24zyllp6lnjx7wdtyctgvyd.onion/
Targets
-
-
Target
5549e8943fcb60643dc032765675bc486cb7f2f2603d8399ae3946df08b0be84.bin.sample
-
Size
828KB
-
MD5
c6fc90e5ff451a319ca1cb857ffd3800
-
SHA1
21912a61a881ab758f2e176f93ab64ca446951ca
-
SHA256
5549e8943fcb60643dc032765675bc486cb7f2f2603d8399ae3946df08b0be84
-
SHA512
8a79174ca59a8c53d6f5e820f068abb9e2afa24c1f47ac46fc5325a9b612e1365711373eb34fe55141cc65adc560712296b03facc6cf2d6408059d28e6e6f5f3
-
SSDEEP
12288:4FTfM3+OeO+OeNhBBhhBBd1hzUGvXWoCwUA39w0b6lSydVuYMuOBb70BszJo1Wbz:41f71VXUA39w0b4SydVVGkUJo4OnLs
Score10/10-
Black Basta
A ransomware family targeting Windows and Linux ESXi first seen in February 2022.
-
Blackbasta family
-
Renames multiple (2228) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-