General
-
Target
2025-04-03_7848fa895292fc11ba797838b9109d22_black-basta_cobalt-strike_coinminer_satacom_zxxz
-
Size
45.2MB
-
Sample
250403-sag91azr17
-
MD5
7848fa895292fc11ba797838b9109d22
-
SHA1
617b3a672cdbd088a7c4f44ab7a210462cebc4f1
-
SHA256
62b42e660f7841df60bea33069128ea5666885aca89025e639b38f547865cb9a
-
SHA512
388ec777860a14a2492a8b08868cc043002380702cb25aa48de1b26b26d2ddbcd8f34526c49621b3e6025807627f3e2c3b9b8cb53c93c14f092e35ba6dd30406
-
SSDEEP
393216:K76L6otUitqtH7wHtXq2pt2jbOCacCFIK0fpP9HF4VW8yfynVQx4urYsANulL7Nb:K0LoCOn+2ys4urYDNulLBiu/
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-03_7848fa895292fc11ba797838b9109d22_black-basta_cobalt-strike_coinminer_satacom_zxxz.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
darkcloud
Protocol: ftp- Host:
@StrFtpServer - Port:
21 - Username:
@StrFtpUser - Password:
@StrFtpPass
Targets
-
-
Target
2025-04-03_7848fa895292fc11ba797838b9109d22_black-basta_cobalt-strike_coinminer_satacom_zxxz
-
Size
45.2MB
-
MD5
7848fa895292fc11ba797838b9109d22
-
SHA1
617b3a672cdbd088a7c4f44ab7a210462cebc4f1
-
SHA256
62b42e660f7841df60bea33069128ea5666885aca89025e639b38f547865cb9a
-
SHA512
388ec777860a14a2492a8b08868cc043002380702cb25aa48de1b26b26d2ddbcd8f34526c49621b3e6025807627f3e2c3b9b8cb53c93c14f092e35ba6dd30406
-
SSDEEP
393216:K76L6otUitqtH7wHtXq2pt2jbOCacCFIK0fpP9HF4VW8yfynVQx4urYsANulL7Nb:K0LoCOn+2ys4urYDNulLBiu/
Score10/10-
Darkcloud family
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-