General
-
Target
2025-03-31_91acae0fff5ecbf0b65c3ddebb5a824a_bitrat_black-basta_cobalt-strike_luca-stealer
-
Size
418KB
-
Sample
250331-xjxs9swtf1
-
MD5
91acae0fff5ecbf0b65c3ddebb5a824a
-
SHA1
229e073dbcbb72bdfee2c244e5d066ad949d2582
-
SHA256
8a193db0ff08237f63c036d422f52276a4e575476763dc391455ed5b12269c07
-
SHA512
bdaa57605db2d8dcb05d60ca79cc3ea038ae40fd5ef932ac68dc0687c8b6d187961012be3032caf6f35b609fd2f0089189a50f5d2b208c3a93f9e81e8c0326fc
-
SSDEEP
12288:FnvxplpMAX99S4B009MqyQMKNT7ZxfAD8xE:FvxplpMAtU4Bl9MdQFT7ZxIoS
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-31_91acae0fff5ecbf0b65c3ddebb5a824a_bitrat_black-basta_cobalt-strike_luca-stealer.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
C:\Program Files\readme.txt
dragonforce
http://3pktcrcbmssvrnwe5skburdwe2h3v6ibdnn5kbjqihsg6eu6s6b7ryqd.onion
http://z3wqggtxft7id3ibr7srivv5gjof5fwg76slewnzwwakjuf3nlhukdid.onion
Targets
-
-
Target
2025-03-31_91acae0fff5ecbf0b65c3ddebb5a824a_bitrat_black-basta_cobalt-strike_luca-stealer
-
Size
418KB
-
MD5
91acae0fff5ecbf0b65c3ddebb5a824a
-
SHA1
229e073dbcbb72bdfee2c244e5d066ad949d2582
-
SHA256
8a193db0ff08237f63c036d422f52276a4e575476763dc391455ed5b12269c07
-
SHA512
bdaa57605db2d8dcb05d60ca79cc3ea038ae40fd5ef932ac68dc0687c8b6d187961012be3032caf6f35b609fd2f0089189a50f5d2b208c3a93f9e81e8c0326fc
-
SSDEEP
12288:FnvxplpMAX99S4B009MqyQMKNT7ZxfAD8xE:FvxplpMAtU4Bl9MdQFT7ZxIoS
-
DragonForce
Ransomware family based on Lockbit that was first observed in November 2023.
-
Dragonforce family
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Drops desktop.ini file(s)
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1