General
-
Target
2025-03-29_d62b289592043f863f302d7e8582e9bc_black-basta_cobalt-strike_ryuk_satacom
-
Size
634KB
-
Sample
250329-q14vkswly2
-
MD5
d62b289592043f863f302d7e8582e9bc
-
SHA1
cc72a132de961bb1f4398b933d88585ef8c29a41
-
SHA256
3c5a551b8fee65ffc444a3c0730b990591c3a95e442426563539f0a2ca3871d2
-
SHA512
63d389102c1b78ea5157aad0a3f45f351a5752ae896729d85be81b70721f19869efdb8dfa87906f891be9bec0d9154b7498e4ac4216fd3ec574fae64707e258c
-
SSDEEP
12288:SaQ9+ICJkAp0mBpehM8ppy+E4J/aDQy5b4WeZGl/GtWV3OH2JrZw9RlUR:Kw4GBpehMjcuP5b4Fty3pZwXlUR
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-29_d62b289592043f863f302d7e8582e9bc_black-basta_cobalt-strike_ryuk_satacom.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-29_d62b289592043f863f302d7e8582e9bc_black-basta_cobalt-strike_ryuk_satacom.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
vidar
13.3
928af183c2a2807a3c0526e8c0c9369d
https://t.me/lw25chm
https://steamcommunity.com/profiles/76561199839170361
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0
Extracted
lumma
https://wxayfarer.live/ALosnz
https://byteplusx.digital/aXweAX
https://travewlio.shop/ZNxbHi
https://skynetxc.live/AksoPA
https://pixtreev.run/LkaUz
https://advennture.top/GKsiio
https://atargett.top/dsANGt
https://70sparkiob.digital/KeASUp
https://appgridn.live/LEjdAK
Extracted
stealc
default
http://77.90.153.241
-
url_path
/612acd258782ade8.php
Targets
-
-
Target
2025-03-29_d62b289592043f863f302d7e8582e9bc_black-basta_cobalt-strike_ryuk_satacom
-
Size
634KB
-
MD5
d62b289592043f863f302d7e8582e9bc
-
SHA1
cc72a132de961bb1f4398b933d88585ef8c29a41
-
SHA256
3c5a551b8fee65ffc444a3c0730b990591c3a95e442426563539f0a2ca3871d2
-
SHA512
63d389102c1b78ea5157aad0a3f45f351a5752ae896729d85be81b70721f19869efdb8dfa87906f891be9bec0d9154b7498e4ac4216fd3ec574fae64707e258c
-
SSDEEP
12288:SaQ9+ICJkAp0mBpehM8ppy+E4J/aDQy5b4WeZGl/GtWV3OH2JrZw9RlUR:Kw4GBpehMjcuP5b4Fty3pZwXlUR
-
Detect Vidar Stealer
-
Lumma family
-
Stealc family
-
Vidar family
-
Downloads MZ/PE file
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Drops startup file
-
Executes dropped EXE
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Modify Authentication Process
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2