General
-
Target
2025-04-02_cd54780ee2213a05468fa0d24eedd576_bitrat_black-basta_cobalt-strike_luca-stealer
-
Size
418KB
-
Sample
250402-ym865sswcx
-
MD5
cd54780ee2213a05468fa0d24eedd576
-
SHA1
011894f40bab6963133d46a1976fa587a4b66378
-
SHA256
6782ad0c3efc0d0520dc2088e952c504f6a069c36a0308b88c7daadd600250a9
-
SHA512
e41e327ecb7859bfb47bbdff5f45097e328e4339e85035b0e2f9a2d8b31c1a5bd135fa047dce003d497b049312ff0d67c7221a17f526b369f6640b2e3cb4594e
-
SSDEEP
12288:FnvxplpMAX99S4B009MqyQMKNT7tDfAD8xE:FvxplpMAtU4Bl9MdQFT7tDIoS
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-02_cd54780ee2213a05468fa0d24eedd576_bitrat_black-basta_cobalt-strike_luca-stealer.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
C:\Program Files\readme.txt
dragonforce
http://3pktcrcbmssvrnwe5skburdwe2h3v6ibdnn5kbjqihsg6eu6s6b7ryqd.onion
http://z3wqggtxft7id3ibr7srivv5gjof5fwg76slewnzwwakjuf3nlhukdid.onion
Targets
-
-
Target
2025-04-02_cd54780ee2213a05468fa0d24eedd576_bitrat_black-basta_cobalt-strike_luca-stealer
-
Size
418KB
-
MD5
cd54780ee2213a05468fa0d24eedd576
-
SHA1
011894f40bab6963133d46a1976fa587a4b66378
-
SHA256
6782ad0c3efc0d0520dc2088e952c504f6a069c36a0308b88c7daadd600250a9
-
SHA512
e41e327ecb7859bfb47bbdff5f45097e328e4339e85035b0e2f9a2d8b31c1a5bd135fa047dce003d497b049312ff0d67c7221a17f526b369f6640b2e3cb4594e
-
SSDEEP
12288:FnvxplpMAX99S4B009MqyQMKNT7tDfAD8xE:FvxplpMAtU4Bl9MdQFT7tDIoS
-
DragonForce
Ransomware family based on Lockbit that was first observed in November 2023.
-
Dragonforce family
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Drops desktop.ini file(s)
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1