General

  • Target

    2025-04-07_fe49dbc5b45b0870a0c4e6ecf5edb2c9_black-basta_cobalt-strike_satacom

  • Size

    6.3MB

  • MD5

    fe49dbc5b45b0870a0c4e6ecf5edb2c9

  • SHA1

    0e2fc8505f8f031453760b5a13ed008bda616279

  • SHA256

    79866400faef209c9ba595eb4759ad737176304c7ba1c8c711dc86b0ba7e4043

  • SHA512

    a5b7a35d86b2635710a3ed05980ae86f25246f5cd91df4557a2131215baec292c458e6d7d733760418e44c8dea0dcb2091d70c54d58d01729abc6834bc5f11fb

  • SSDEEP

    196608:+x+f6jEnoDPvbUpFZ6pCPK6YYzaOFvcVLa7hwIFP:xf6EoDPgFNRLvga1w8P

Score
10/10

Malware Config

Extracted

Family

hijackloader

Attributes
  • directory

    %APPDATA%\fkd_Control_test

  • inject_dll

    %windir%\SysWOW64\input.dll

xor.hex

Signatures

  • Detects HijackLoader (aka IDAT Loader) 1 IoCs
  • Hijackloader family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2025-04-07_fe49dbc5b45b0870a0c4e6ecf5edb2c9_black-basta_cobalt-strike_satacom
    .exe windows:6 windows x64 arch:x64

    8b4d0760d426c9138154c52a7dcc4339


    Headers

    Imports

    Sections