General
-
Target
2025-03-30_5adcf9918838e95aa439ddcc4217c8e1_black-basta_cobalt-strike_satacom
-
Size
3.9MB
-
Sample
250330-rrve8azzg1
-
MD5
5adcf9918838e95aa439ddcc4217c8e1
-
SHA1
8ae5c3de8cb1e9788bdd2a09e840b31348cd76c0
-
SHA256
636e55648c9d3fc08bc814e01765f34e71db576aef5397e16e6498d3a7ee7f7e
-
SHA512
cc48b85171edd62861f4eca49980e9353e8f0a65fdcec9f34928ce8f7e1bfbef932c28cdbcf2aa1f0c53490affd6d87c1fb5d7a62cb29e02fd924e797db15352
-
SSDEEP
98304:zziZpcTIjmxUPjRJjPmEriDJbg5ajTd806/x/rMsr:zzqGMfeEmDJM5andZ6J/Asr
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-30_5adcf9918838e95aa439ddcc4217c8e1_black-basta_cobalt-strike_satacom.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-30_5adcf9918838e95aa439ddcc4217c8e1_black-basta_cobalt-strike_satacom.exe
Resource
win10v2004-20250313-en
Malware Config
Extracted
lumma
https://starjetv.run/GPazo
https://koreheatq.live/gsopp
https://castmaxw.run/ganzde
https://weldorae.digital/geds
https://steelixr.live/aguiz
https://advennture.top/GKsiio
https://targett.top/dsANGt
https://smeltingt.run/giiaus
https://ferromny.digital/gwpd
Extracted
cryptbot
http://home.sixbb6mn.top/jTNyqiIkTqrjLPexvdad174
Targets
-
-
Target
2025-03-30_5adcf9918838e95aa439ddcc4217c8e1_black-basta_cobalt-strike_satacom
-
Size
3.9MB
-
MD5
5adcf9918838e95aa439ddcc4217c8e1
-
SHA1
8ae5c3de8cb1e9788bdd2a09e840b31348cd76c0
-
SHA256
636e55648c9d3fc08bc814e01765f34e71db576aef5397e16e6498d3a7ee7f7e
-
SHA512
cc48b85171edd62861f4eca49980e9353e8f0a65fdcec9f34928ce8f7e1bfbef932c28cdbcf2aa1f0c53490affd6d87c1fb5d7a62cb29e02fd924e797db15352
-
SSDEEP
98304:zziZpcTIjmxUPjRJjPmEriDJbg5ajTd806/x/rMsr:zzqGMfeEmDJM5andZ6J/Asr
-
Cryptbot family
-
Lumma family
-
Modifies visiblity of hidden/system files in Explorer
-
Enumerates VirtualBox registry keys
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Virtualization/Sandbox Evasion
1