General

  • Target

    2025-04-12_99cd08429a0119cfafbda1a0f1dfbfd1_black-basta_cobalt-strike_satacom

  • Size

    14.3MB

  • Sample

    250412-frf22sxwhv

  • MD5

    99cd08429a0119cfafbda1a0f1dfbfd1

  • SHA1

    d20d94481ba06cc7f0f05968c8ef360cf56765e8

  • SHA256

    09af51f418d55d3560c2eb2e9407dc89c829cb579e6a17972ef7915d99a08fb4

  • SHA512

    9dfd8a6b0dc6a3cd494c7455b399e0e20f0324b8552517ef382d5789f2e941bf9886a97396e3f0ec24816bd3e01c4b8d154d1a51e107231e2841d4c125bc0804

  • SSDEEP

    393216:Yu7L/qdQusl7Q+q9RoWOv+9faV3vrDvmfe:YCLydQu2QdborvSiV3jDvae

Malware Config

Targets

    • Target

      2025-04-12_99cd08429a0119cfafbda1a0f1dfbfd1_black-basta_cobalt-strike_satacom

    • Size

      14.3MB

    • MD5

      99cd08429a0119cfafbda1a0f1dfbfd1

    • SHA1

      d20d94481ba06cc7f0f05968c8ef360cf56765e8

    • SHA256

      09af51f418d55d3560c2eb2e9407dc89c829cb579e6a17972ef7915d99a08fb4

    • SHA512

      9dfd8a6b0dc6a3cd494c7455b399e0e20f0324b8552517ef382d5789f2e941bf9886a97396e3f0ec24816bd3e01c4b8d154d1a51e107231e2841d4c125bc0804

    • SSDEEP

      393216:Yu7L/qdQusl7Q+q9RoWOv+9faV3vrDvmfe:YCLydQu2QdborvSiV3jDvae

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v16

Tasks