General
-
Target
2025-04-02_52df7e5c0a0ea8ebdc91132d2e3df15d_black-basta_cobalt-strike_ryuk_satacom
-
Size
1.9MB
-
Sample
250402-q9k4tsxwgw
-
MD5
52df7e5c0a0ea8ebdc91132d2e3df15d
-
SHA1
ea3e181fc08863e9ed7a01933c845039f39e7515
-
SHA256
ff43e418ab0fac587b9f6d19ccbeb59dcd863c9812af96e430573215cb1fc68f
-
SHA512
4c4f728fb7568c89407c4708266ce99bd95ed405a786a2287bf6581548183354770f5059b0a7ee9b532a753eb6235afbb9b861ab4c6b43bcd33aea9092ce38c4
-
SSDEEP
24576:OSdQ2Ak+vC2ZfEbpRsnqQ02L8CJn+rvq1I4ENBtWrv/:9F14yTshBI4km
Static task
static1
Malware Config
Extracted
darkcloud
Protocol: ftp- Host:
@StrFtpServer - Port:
21 - Username:
@StrFtpUser - Password:
@StrFtpPass
Targets
-
-
Target
2025-04-02_52df7e5c0a0ea8ebdc91132d2e3df15d_black-basta_cobalt-strike_ryuk_satacom
-
Size
1.9MB
-
MD5
52df7e5c0a0ea8ebdc91132d2e3df15d
-
SHA1
ea3e181fc08863e9ed7a01933c845039f39e7515
-
SHA256
ff43e418ab0fac587b9f6d19ccbeb59dcd863c9812af96e430573215cb1fc68f
-
SHA512
4c4f728fb7568c89407c4708266ce99bd95ed405a786a2287bf6581548183354770f5059b0a7ee9b532a753eb6235afbb9b861ab4c6b43bcd33aea9092ce38c4
-
SSDEEP
24576:OSdQ2Ak+vC2ZfEbpRsnqQ02L8CJn+rvq1I4ENBtWrv/:9F14yTshBI4km
-
Darkcloud family
-
Suspicious use of SetThreadContext
-