General

  • Target

    2025-04-01_6c1a4a027e7547c3115465642afdac1c_black-basta_cobalt-strike_satacom.zip

  • Size

    21.7MB

  • Sample

    250414-3cstmatmt9

  • MD5

    0d2d5374bcb0f828acf6a1d1bcaab4af

  • SHA1

    8ea16eb1428b50a12c31b9851a6f3c7e1b9fa7b7

  • SHA256

    690b895fefbe56593a347a085c73cebf82da53d9c09985f137ad526787dbf849

  • SHA512

    b3828a0be7006f590d0e4e431f7a86fd45437742383de2345aebba46837b1ccbaf0dec42a37752d1b082c931072fbc8f57ac248ab58567277061b06f9695693e

  • SSDEEP

    393216:IIiUu74I/jqhW99JiihNU/ic1oI5DWt8pPxqoFQk+fj9ZfYLpBLMy856:IIihL/jW+9AiIXzw8DqoFQVjHYNBLVT

Malware Config

Extracted

Family

xworm

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    svchost.exe

  • pastebin_url

    https://pastebin.com/raw/ZnhxAV6a

  • telegram

    https://api.telegram.org/bot7564421410:AAHgBw2xu-96C8rVIiibt59lzDnMAPliOm4/sendMessage?chat_id=7741783264

Extracted

Family

asyncrat

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

https://api.telegram.org/bot7564421410:AAHgBw2xu-96C8rVIiibt59lzDnMAPliOm4/sendMessage?chat_id=7741783264

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain
1
sL8JhBQtbOgZY62VnqT58gD1W3hQvKkS

Extracted

Family

gurcu

C2

https://api.telegram.org/bot7564421410:AAHgBw2xu-96C8rVIiibt59lzDnMAPliOm4/sendMessage?chat_id=7741783264

https://api.telegram.org/bot7564421410:AAHgBw2xu-96C8rVIiibt59lzDnMAPliOm4/sendDocument?chat_id=774178326

https://api.telegram.org/bot1119746739:AAGMhvpUjXI4CzIfizRC--VXilxnkJlhaf8/sendDocument?chat_id=109642586

Targets

    • Target

      2025-04-01_6c1a4a027e7547c3115465642afdac1c_black-basta_cobalt-strike_satacom.zip

    • Size

      21.7MB

    • MD5

      0d2d5374bcb0f828acf6a1d1bcaab4af

    • SHA1

      8ea16eb1428b50a12c31b9851a6f3c7e1b9fa7b7

    • SHA256

      690b895fefbe56593a347a085c73cebf82da53d9c09985f137ad526787dbf849

    • SHA512

      b3828a0be7006f590d0e4e431f7a86fd45437742383de2345aebba46837b1ccbaf0dec42a37752d1b082c931072fbc8f57ac248ab58567277061b06f9695693e

    • SSDEEP

      393216:IIiUu74I/jqhW99JiihNU/ic1oI5DWt8pPxqoFQk+fj9ZfYLpBLMy856:IIihL/jW+9AiIXzw8DqoFQVjHYNBLVT

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Detect Xworm Payload

    • Gurcu family

    • Gurcu, WhiteSnake

      Gurcu aka WhiteSnake is a malware stealer written in C#.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Async RAT payload

    • Contacts a large (7575) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Stops running service(s)

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Indicator Removal: Clear Windows Event Logs

      Clear Windows Event Logs to hide the activity of an intrusion.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops desktop.ini file(s)

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Looks up geolocation information via web service

      Uses a legitimate geolocation service to find the infected system's geolocation info.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Drops file in System32 directory

    • Enumerates processes with tasklist

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      2025-04-01_6c1a4a027e7547c3115465642afdac1c_black-basta_cobalt-strike_satacom.exe

    • Size

      21.8MB

    • MD5

      6c1a4a027e7547c3115465642afdac1c

    • SHA1

      3aa816e0ff0b23b75957edb0280d90041155c8bb

    • SHA256

      30e1b63f195e59834ce0ff34050d41ae0d75ebc27f9ef33b03668e0ae265d887

    • SHA512

      3da7b1018250dd83d95de18db6edc47d9b82dbee495e666a6623c620b7b619d1d7dfc2a95ff7acd878a7982c5348d0ee5a985b6cea4ebb94605421a3e93a6e7e

    • SSDEEP

      393216:KKf8ng0LjK5eRnHIoxXa1Ooz4m/fULIlzNuEDs4w5Pxb3yr1v7m8wl:KK0NLjO+noooTD2IvuEDsnPZy5v7d

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Detect Xworm Payload

    • Gurcu family

    • Gurcu, WhiteSnake

      Gurcu aka WhiteSnake is a malware stealer written in C#.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Async RAT payload

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Contacts a large (607) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Stops running service(s)

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Looks up geolocation information via web service

      Uses a legitimate geolocation service to find the infected system's geolocation info.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Drops file in System32 directory

    • Enumerates processes with tasklist

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v16

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.