General
-
Target
2025-04-01_e68bcafeb4e4e435c49b88be60c1dd54_black-basta_cobalt-strike_satacom
-
Size
14.0MB
-
Sample
250401-fv7n6swnw2
-
MD5
e68bcafeb4e4e435c49b88be60c1dd54
-
SHA1
ea512e97ea6d385e50e7f5ead4b4c45a12a2db66
-
SHA256
d10ccc7c177a6d2892d9335c49734f0e39dd4e190eecc3caffd11353b17ce571
-
SHA512
7c2c298cdd8474d73bcf180117641b1031cb69d7f6527f6b2f1daf1fa2cac310f676806254c6a4e7b1a6e72dd500385efc87def28ca7ae6d2cdb556259515b2b
-
SSDEEP
393216:R3cTRB1nXMCHWUjqVg74wOugWY5JPVBHz7fqn:R3wnXMb8ODwOue5JPVt7yn
Behavioral task
behavioral1
Sample
2025-04-01_e68bcafeb4e4e435c49b88be60c1dd54_black-basta_cobalt-strike_satacom.exe
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
2025-04-01_e68bcafeb4e4e435c49b88be60c1dd54_black-basta_cobalt-strike_satacom
-
Size
14.0MB
-
MD5
e68bcafeb4e4e435c49b88be60c1dd54
-
SHA1
ea512e97ea6d385e50e7f5ead4b4c45a12a2db66
-
SHA256
d10ccc7c177a6d2892d9335c49734f0e39dd4e190eecc3caffd11353b17ce571
-
SHA512
7c2c298cdd8474d73bcf180117641b1031cb69d7f6527f6b2f1daf1fa2cac310f676806254c6a4e7b1a6e72dd500385efc87def28ca7ae6d2cdb556259515b2b
-
SSDEEP
393216:R3cTRB1nXMCHWUjqVg74wOugWY5JPVBHz7fqn:R3wnXMb8ODwOue5JPVt7yn
Score7/10-
Drops startup file
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-