General

  • Target

    2025-04-03_7848fa895292fc11ba797838b9109d22_black-basta_cobalt-strike_coinminer_satacom_zxxz

  • Size

    45.2MB

  • Sample

    250403-sag91azr17

  • MD5

    7848fa895292fc11ba797838b9109d22

  • SHA1

    617b3a672cdbd088a7c4f44ab7a210462cebc4f1

  • SHA256

    62b42e660f7841df60bea33069128ea5666885aca89025e639b38f547865cb9a

  • SHA512

    388ec777860a14a2492a8b08868cc043002380702cb25aa48de1b26b26d2ddbcd8f34526c49621b3e6025807627f3e2c3b9b8cb53c93c14f092e35ba6dd30406

  • SSDEEP

    393216:K76L6otUitqtH7wHtXq2pt2jbOCacCFIK0fpP9HF4VW8yfynVQx4urYsANulL7Nb:K0LoCOn+2ys4urYDNulLBiu/

Malware Config

Extracted

Family

darkcloud

Credentials

  • Protocol:
    ftp
  • Host:
    @StrFtpServer
  • Port:
    21
  • Username:
    @StrFtpUser
  • Password:
    @StrFtpPass

Targets

    • Target

      2025-04-03_7848fa895292fc11ba797838b9109d22_black-basta_cobalt-strike_coinminer_satacom_zxxz

    • Size

      45.2MB

    • MD5

      7848fa895292fc11ba797838b9109d22

    • SHA1

      617b3a672cdbd088a7c4f44ab7a210462cebc4f1

    • SHA256

      62b42e660f7841df60bea33069128ea5666885aca89025e639b38f547865cb9a

    • SHA512

      388ec777860a14a2492a8b08868cc043002380702cb25aa48de1b26b26d2ddbcd8f34526c49621b3e6025807627f3e2c3b9b8cb53c93c14f092e35ba6dd30406

    • SSDEEP

      393216:K76L6otUitqtH7wHtXq2pt2jbOCacCFIK0fpP9HF4VW8yfynVQx4urYsANulL7Nb:K0LoCOn+2ys4urYDNulLBiu/

    • DarkCloud

      An information stealer written in Visual Basic.

    • Darkcloud family

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks