General
-
Target
2025-03-29_5c07a7a4e57ee404b231bd85bb2e8602_black-basta_cobalt-strike_ryuk_satacom
-
Size
1.3MB
-
Sample
250329-2v1rhsxlv9
-
MD5
5c07a7a4e57ee404b231bd85bb2e8602
-
SHA1
76d64cdc6a5265407e1b4a75426599f29adc1b5a
-
SHA256
0b0abe68f13000275c162908740469a9938a5463ee07404c4f43eec8fb9299f5
-
SHA512
19a362b97c6d3ad2c6f7e7b9cdeb5f4abe8e2f38bba00a1805b14f48fbf0a3f8d2b408714dbcff69546728d3c06360db84c2ddb91aa2bbf3f1c9414713a2479f
-
SSDEEP
24576:sw4GBpehMjcuP5b4FtyA1r6LgE0WpY4yObTpRrJ/vzl9Z3ERw/KB7cn:sw4GBcz05styAYL30IyObNRrJ/7ZERQT
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-29_5c07a7a4e57ee404b231bd85bb2e8602_black-basta_cobalt-strike_ryuk_satacom.exe
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
2025-03-29_5c07a7a4e57ee404b231bd85bb2e8602_black-basta_cobalt-strike_ryuk_satacom
-
Size
1.3MB
-
MD5
5c07a7a4e57ee404b231bd85bb2e8602
-
SHA1
76d64cdc6a5265407e1b4a75426599f29adc1b5a
-
SHA256
0b0abe68f13000275c162908740469a9938a5463ee07404c4f43eec8fb9299f5
-
SHA512
19a362b97c6d3ad2c6f7e7b9cdeb5f4abe8e2f38bba00a1805b14f48fbf0a3f8d2b408714dbcff69546728d3c06360db84c2ddb91aa2bbf3f1c9414713a2479f
-
SSDEEP
24576:sw4GBpehMjcuP5b4FtyA1r6LgE0WpY4yObTpRrJ/vzl9Z3ERw/KB7cn:sw4GBcz05styAYL30IyObNRrJ/7ZERQT
-
SectopRAT payload
-
Sectoprat family
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1