General

  • Target

    2025-03-31_bb4bfab94400b5d96f99fe242c63d5cd_black-basta_cobalt-strike_rhadamanthys_satacom

  • Size

    10.8MB

  • Sample

    250331-xbe89ayjv7

  • MD5

    bb4bfab94400b5d96f99fe242c63d5cd

  • SHA1

    1835f0f12c6cc142611f367d723a45cb7aa805d9

  • SHA256

    b97db6af674f67d377c78906e262c2b3cb8b8c80c9edbb585c3ed8c81387d90e

  • SHA512

    1e9c8470e48b2add8cb44c6b41b5f68ed6bf9e190a34b6bbc00a6eb32eabbb571882113aec85fcc65a168dc28b3ca9c080d6a5d1de6685b6fe7c089a552023d8

  • SSDEEP

    196608:VvZnQHQZg0HiouWJysVYvsOaoyMxxvjDDAx0al2dxwMFnVpdVpqmN:HngCHi9WJdoyMxtDDAxBI7VhsU

Malware Config

Extracted

Family

svcstealer

C2

176.113.115.149

185.81.68.156

http://176.113.115.149/bin/bot64.bin

Extracted

Family

svcstealer

Version

3.1

C2

185.81.68.156

176.113.115.149

Attributes
  • url_paths

    /svcstealer/get.php

Extracted

Family

svcstealer

Version

3.0

C2

185.81.68.147

185.81.68.148

185.81.68.156

176.113.115.149

Attributes
  • url_paths

    /svcstealer/get.php

Targets

    • Target

      2025-03-31_bb4bfab94400b5d96f99fe242c63d5cd_black-basta_cobalt-strike_rhadamanthys_satacom

    • Size

      10.8MB

    • MD5

      bb4bfab94400b5d96f99fe242c63d5cd

    • SHA1

      1835f0f12c6cc142611f367d723a45cb7aa805d9

    • SHA256

      b97db6af674f67d377c78906e262c2b3cb8b8c80c9edbb585c3ed8c81387d90e

    • SHA512

      1e9c8470e48b2add8cb44c6b41b5f68ed6bf9e190a34b6bbc00a6eb32eabbb571882113aec85fcc65a168dc28b3ca9c080d6a5d1de6685b6fe7c089a552023d8

    • SSDEEP

      196608:VvZnQHQZg0HiouWJysVYvsOaoyMxxvjDDAx0al2dxwMFnVpdVpqmN:HngCHi9WJdoyMxtDDAxBI7VhsU

    • Detects SvcStealer Payload

      SvcStealer aka Diamotrix Clipper is a stealer/downloader written in C++.

    • SvcStealer, Diamotrix

      SvcStealer aka Diamotrix Clipper is a stealer/downloader written in C++.

    • Svcstealer family

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks