General

  • Target

    2025-04-13_bb564b4d92383e54fceaebb614cf0795_black-basta_cobalt-strike_satacom

  • Size

    13.2MB

  • Sample

    250413-3qzt4awzd1

  • MD5

    bb564b4d92383e54fceaebb614cf0795

  • SHA1

    fbe7bdd896fcb2fdf8273fe65db123ab0749003f

  • SHA256

    0b2f4b9ce514e3cb6898fb47000a8a3b83b020fe78ce69f2abd856f89091e82f

  • SHA512

    59235f98cf785d4965ab0cbedb15ad9800be41e261ce087a91e56f64b0ef9834183883e12a413c4a6455de1e548637f7ebe839891cc934a0de3a1e87dae08df5

  • SSDEEP

    393216:LWdqwuwq3Obs2ClzbjdQJlSwF3MnG3xlCOVbrF93RH:L8huwq3ObRqzXdQn3MGqOVXh

Malware Config

Targets

    • Target

      2025-04-13_bb564b4d92383e54fceaebb614cf0795_black-basta_cobalt-strike_satacom

    • Size

      13.2MB

    • MD5

      bb564b4d92383e54fceaebb614cf0795

    • SHA1

      fbe7bdd896fcb2fdf8273fe65db123ab0749003f

    • SHA256

      0b2f4b9ce514e3cb6898fb47000a8a3b83b020fe78ce69f2abd856f89091e82f

    • SHA512

      59235f98cf785d4965ab0cbedb15ad9800be41e261ce087a91e56f64b0ef9834183883e12a413c4a6455de1e548637f7ebe839891cc934a0de3a1e87dae08df5

    • SSDEEP

      393216:LWdqwuwq3Obs2ClzbjdQJlSwF3MnG3xlCOVbrF93RH:L8huwq3ObRqzXdQn3MGqOVXh

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v16

Tasks