General
-
Target
2025-03-31_4ccb0b694056ee88f0c620568d2db2fb_black-basta_cobalt-strike_satacom
-
Size
967KB
-
Sample
250331-mtds2azny5
-
MD5
4ccb0b694056ee88f0c620568d2db2fb
-
SHA1
dd6deb3cdcd9526f9f9f4d9070a4bb699b16b620
-
SHA256
96ad3c384af92598cddd954ce1b462de8a31e8e2b206a97bea5a6379d10059e7
-
SHA512
03a37a3affd371439cc719f74982f22e376d9cfd5f01fbf331dbe2977dc946f723c752b1c34f6f261433fae6e4f9a43525466f708d515b405927f0b439667472
-
SSDEEP
24576:aSsZR9MmylrGpYgpgEIUjKiZm6L3YR+K1y/xyU:aSsv2z4pYgpgEI0KiZLLoB1w
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-31_4ccb0b694056ee88f0c620568d2db2fb_black-basta_cobalt-strike_satacom.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7636279565:AAFfbV9wqzcTb1Fa4IkguermnQhZKwCqJSo/sendMessage?chat_id=7913121735
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
2025-03-31_4ccb0b694056ee88f0c620568d2db2fb_black-basta_cobalt-strike_satacom
-
Size
967KB
-
MD5
4ccb0b694056ee88f0c620568d2db2fb
-
SHA1
dd6deb3cdcd9526f9f9f4d9070a4bb699b16b620
-
SHA256
96ad3c384af92598cddd954ce1b462de8a31e8e2b206a97bea5a6379d10059e7
-
SHA512
03a37a3affd371439cc719f74982f22e376d9cfd5f01fbf331dbe2977dc946f723c752b1c34f6f261433fae6e4f9a43525466f708d515b405927f0b439667472
-
SSDEEP
24576:aSsZR9MmylrGpYgpgEIUjKiZm6L3YR+K1y/xyU:aSsv2z4pYgpgEI0KiZLLoB1w
-
Asyncrat family
-
StormKitty payload
-
Stormkitty family
-
Async RAT payload
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1