General
-
Target
2025-04-14_413c38e2d5fefaa876ea3be70366221f_black-basta_cobalt-strike_coinminer_satacom_zxxz
-
Size
43.9MB
-
Sample
250414-jf7meattgs
-
MD5
413c38e2d5fefaa876ea3be70366221f
-
SHA1
dcc8c3c35bc90f7206ecb070b5b86e7c0d63327e
-
SHA256
f32749f0ed8816cf25f2e5f83c245f12af6c4be67d1aa41e3aa47753e647905b
-
SHA512
baa2ac02b699931e6b85e1dcfa0be0e4e4f4922ec7e7210f42724d44d0a3665da53de11798b2a76781e28b2d58fe15c3c5877ded1886458ebdf2e98e6ffc9022
-
SSDEEP
393216:y76L6otUitqtH7wHtXq2pt2jbOCacCFIK0fpP9HF4VW8yfynVQx4urYsANulL7Nr:y0LoCOn+2ys4urYDNulLBiuP
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-14_413c38e2d5fefaa876ea3be70366221f_black-basta_cobalt-strike_coinminer_satacom_zxxz.exe
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
2025-04-14_413c38e2d5fefaa876ea3be70366221f_black-basta_cobalt-strike_coinminer_satacom_zxxz
-
Size
43.9MB
-
MD5
413c38e2d5fefaa876ea3be70366221f
-
SHA1
dcc8c3c35bc90f7206ecb070b5b86e7c0d63327e
-
SHA256
f32749f0ed8816cf25f2e5f83c245f12af6c4be67d1aa41e3aa47753e647905b
-
SHA512
baa2ac02b699931e6b85e1dcfa0be0e4e4f4922ec7e7210f42724d44d0a3665da53de11798b2a76781e28b2d58fe15c3c5877ded1886458ebdf2e98e6ffc9022
-
SSDEEP
393216:y76L6otUitqtH7wHtXq2pt2jbOCacCFIK0fpP9HF4VW8yfynVQx4urYsANulL7Nr:y0LoCOn+2ys4urYDNulLBiuP
-
Snake Keylogger payload
-
Snakekeylogger family
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-