General

  • Target

    2025-04-03_e4fe1cda1b965c4200e53953007721a6_black-basta_cobalt-strike_luca-stealer

  • Size

    784KB

  • Sample

    250403-n3c4jaymw5

  • MD5

    e4fe1cda1b965c4200e53953007721a6

  • SHA1

    e47cc08535efa0e3b38a518c44f827389699c6c9

  • SHA256

    8f460857b46f1247edac09f59cc4b1535138ef2d4c191f3c923c93c3833fa46d

  • SHA512

    26b783b145d1b300c37d12e39a037150ee5f29921344e90be154a73459f77badd6962a8c5701589160a714e01a59807efc04d97d1843de3e9402f031e604b6d0

  • SSDEEP

    24576:S1818EiYTmpVJUOZ1818EiYTmpVJUOZ1L:bTmpVJUOyTmpVJUOP

Malware Config

Extracted

Family

mylobot

C2

onthestage.ru:6521

krebson.ru:4685

stanislasarnoud.ru:5739

Targets

    • Target

      2025-04-03_e4fe1cda1b965c4200e53953007721a6_black-basta_cobalt-strike_luca-stealer

    • Size

      784KB

    • MD5

      e4fe1cda1b965c4200e53953007721a6

    • SHA1

      e47cc08535efa0e3b38a518c44f827389699c6c9

    • SHA256

      8f460857b46f1247edac09f59cc4b1535138ef2d4c191f3c923c93c3833fa46d

    • SHA512

      26b783b145d1b300c37d12e39a037150ee5f29921344e90be154a73459f77badd6962a8c5701589160a714e01a59807efc04d97d1843de3e9402f031e604b6d0

    • SSDEEP

      24576:S1818EiYTmpVJUOZ1818EiYTmpVJUOZ1L:bTmpVJUOyTmpVJUOP

    • Mylobot

      Botnet which first appeared in 2017 written in C++.

    • Mylobot family

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks