General
-
Target
2025-03-29_9dbe5cb9c6e6dcc6bbda409b0e2f60ab_black-basta_cobalt-strike_ryuk_satacom
-
Size
1.3MB
-
Sample
250329-1pwd6stzbz
-
MD5
9dbe5cb9c6e6dcc6bbda409b0e2f60ab
-
SHA1
cafa259bf42b79ebc467ce248cab97b55876e51f
-
SHA256
8afa3ec25a09a7b41f78fd1cd3d69de3c55c158b9c99f58c59db15220d520636
-
SHA512
d89a36bb13e5da61a16b8e8a174d30e916d5d2f5012b490d5355d1817cc060a9c7b33954a59f185dc61784317734071bc49dfcbeddd073aa978023f9a52cde9f
-
SSDEEP
24576:2w4GBpehMjcuP5b4FtyA1r6LgE0WpY4yObTpRrJ/vzl9Z3ERw/KB7cot:2w4GBcz05styAYL30IyObNRrJ/7ZERQ0
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-29_9dbe5cb9c6e6dcc6bbda409b0e2f60ab_black-basta_cobalt-strike_ryuk_satacom.exe
Resource
win7-20250207-en
Malware Config
Targets
-
-
Target
2025-03-29_9dbe5cb9c6e6dcc6bbda409b0e2f60ab_black-basta_cobalt-strike_ryuk_satacom
-
Size
1.3MB
-
MD5
9dbe5cb9c6e6dcc6bbda409b0e2f60ab
-
SHA1
cafa259bf42b79ebc467ce248cab97b55876e51f
-
SHA256
8afa3ec25a09a7b41f78fd1cd3d69de3c55c158b9c99f58c59db15220d520636
-
SHA512
d89a36bb13e5da61a16b8e8a174d30e916d5d2f5012b490d5355d1817cc060a9c7b33954a59f185dc61784317734071bc49dfcbeddd073aa978023f9a52cde9f
-
SSDEEP
24576:2w4GBpehMjcuP5b4FtyA1r6LgE0WpY4yObTpRrJ/vzl9Z3ERw/KB7cot:2w4GBcz05styAYL30IyObNRrJ/7ZERQ0
-
SectopRAT payload
-
Sectoprat family
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1