General
-
Target
2025-04-13_bbc5a78bd5edd1a3bb50bb368a700e99_black-basta_cobalt-strike_satacom
-
Size
4.9MB
-
Sample
250413-vdwmxazzfy
-
MD5
bbc5a78bd5edd1a3bb50bb368a700e99
-
SHA1
a65fac89b1e3b06286d07eb6a1129af7d64c4e30
-
SHA256
8a64254e4afe98ba46804aa9fb460aa12976dc3750933cb8ba7dda9e3d23a414
-
SHA512
e24cdcbbfb12e6c15f7b4bad99b7264160368daa59d5b55c6efcca56a892de75dc5e6b750be53d1b3c7e08df80dc931e8f69f48af48f7dbe83ba9e6044303d8b
-
SSDEEP
98304:WxWovdiForGveUuGTyF1MSEL6mPJ7vCkoWPAmb8HJJxB:WxWov8FWqeUuG+E/LdPUJo/b8rxB
Behavioral task
behavioral1
Sample
2025-04-13_bbc5a78bd5edd1a3bb50bb368a700e99_black-basta_cobalt-strike_satacom.exe
Resource
win10v2004-20250410-en
Malware Config
Extracted
hijackloader
-
directory
%APPDATA%\Yrs_Docker
-
inject_dll
%windir%\SysWOW64\input.dll
Targets
-
-
Target
2025-04-13_bbc5a78bd5edd1a3bb50bb368a700e99_black-basta_cobalt-strike_satacom
-
Size
4.9MB
-
MD5
bbc5a78bd5edd1a3bb50bb368a700e99
-
SHA1
a65fac89b1e3b06286d07eb6a1129af7d64c4e30
-
SHA256
8a64254e4afe98ba46804aa9fb460aa12976dc3750933cb8ba7dda9e3d23a414
-
SHA512
e24cdcbbfb12e6c15f7b4bad99b7264160368daa59d5b55c6efcca56a892de75dc5e6b750be53d1b3c7e08df80dc931e8f69f48af48f7dbe83ba9e6044303d8b
-
SSDEEP
98304:WxWovdiForGveUuGTyF1MSEL6mPJ7vCkoWPAmb8HJJxB:WxWov8FWqeUuG+E/LdPUJo/b8rxB
Score7/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-