General

  • Target

    2025-04-05_f2fd635545ec8cf7f69cf50cf142b391_black-basta_cobalt-strike_satacom

  • Size

    20.5MB

  • Sample

    250405-hydavaswhv

  • MD5

    f2fd635545ec8cf7f69cf50cf142b391

  • SHA1

    29d155439acf4591b8845e1de81f2eac3f02013e

  • SHA256

    a41709b00ebe1ba6adaf788bf26796b88cfc123edaaab5ca85db58c87e3bde92

  • SHA512

    82b6ff38bc868f00cabd799bf96b4e32c94a2678a4c3e652552733d1da8b46b79b6c297e13588d75a16ddb37721c19acec89b04e79b2414437ace706a9f9b03f

  • SSDEEP

    393216:IqPnLFXlrHIxBZgQpDOETgsvfG9oKgtUpdLjxvE48d3kacsLi:5PLFXNoyQoEGSYdmpTcy

Malware Config

Targets

    • Target

      2025-04-05_f2fd635545ec8cf7f69cf50cf142b391_black-basta_cobalt-strike_satacom

    • Size

      20.5MB

    • MD5

      f2fd635545ec8cf7f69cf50cf142b391

    • SHA1

      29d155439acf4591b8845e1de81f2eac3f02013e

    • SHA256

      a41709b00ebe1ba6adaf788bf26796b88cfc123edaaab5ca85db58c87e3bde92

    • SHA512

      82b6ff38bc868f00cabd799bf96b4e32c94a2678a4c3e652552733d1da8b46b79b6c297e13588d75a16ddb37721c19acec89b04e79b2414437ace706a9f9b03f

    • SSDEEP

      393216:IqPnLFXlrHIxBZgQpDOETgsvfG9oKgtUpdLjxvE48d3kacsLi:5PLFXNoyQoEGSYdmpTcy

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks