General
-
Target
2025-04-14_1a334d5a59e5590ea326db615564ddaf_black-basta_cobalt-strike_satacom
-
Size
10.0MB
-
Sample
250414-js9mjatwgw
-
MD5
1a334d5a59e5590ea326db615564ddaf
-
SHA1
259137de03be0be92d98b080934d721af3d95f2d
-
SHA256
039ed93576a08517bb9f090b0a543e263050fadf9cef990c29d287ec9dfd7754
-
SHA512
0fed930a56e23e58b0ab34ba3cb2958f67bdc6f30ea7e29cfc2e04f23417b101f27c0b22040c0ded5d374f8a3d27e156c7538d28c38fb1f90b7909fa34239513
-
SSDEEP
196608:wW+061zodwfI9jUCD6rlaZLH7qRGrGIYUoZy8FUsOnAozr:VyIH20drLYRZjo3
Behavioral task
behavioral1
Sample
2025-04-14_1a334d5a59e5590ea326db615564ddaf_black-basta_cobalt-strike_satacom.exe
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
2025-04-14_1a334d5a59e5590ea326db615564ddaf_black-basta_cobalt-strike_satacom
-
Size
10.0MB
-
MD5
1a334d5a59e5590ea326db615564ddaf
-
SHA1
259137de03be0be92d98b080934d721af3d95f2d
-
SHA256
039ed93576a08517bb9f090b0a543e263050fadf9cef990c29d287ec9dfd7754
-
SHA512
0fed930a56e23e58b0ab34ba3cb2958f67bdc6f30ea7e29cfc2e04f23417b101f27c0b22040c0ded5d374f8a3d27e156c7538d28c38fb1f90b7909fa34239513
-
SSDEEP
196608:wW+061zodwfI9jUCD6rlaZLH7qRGrGIYUoZy8FUsOnAozr:VyIH20drLYRZjo3
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v16
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3