General

  • Target

    2025-04-15_8fa418803c4e19cde5a75f7d1d243497_black-basta_elex

  • Size

    8.3MB

  • Sample

    250415-rdwq5avpz6

  • MD5

    8fa418803c4e19cde5a75f7d1d243497

  • SHA1

    14e176d1b3177be1b5556e7d4b76daf663b39244

  • SHA256

    0cd1784fe238ffb49a3d072fbc42ad564ae295ec93cf0f38da637fcd91197ec0

  • SHA512

    33a25ecbdc8b4ba5f11fc7c508418936c462bf6b5a4f06c1377f17f8d275bd6ad81b1eb4a134154547497311c8a0c481158327643da0921d8897cc6929e9a5a9

  • SSDEEP

    98304:ZLu1FiRcinKNwFFClurxUTkCOS20BYql7x+oZHcV4i/kgE7/FG4l7zP3u+0xZHcq:ZUXcqG0vGfLgi

Malware Config

Targets

    • Target

      2025-04-15_8fa418803c4e19cde5a75f7d1d243497_black-basta_elex

    • Size

      8.3MB

    • MD5

      8fa418803c4e19cde5a75f7d1d243497

    • SHA1

      14e176d1b3177be1b5556e7d4b76daf663b39244

    • SHA256

      0cd1784fe238ffb49a3d072fbc42ad564ae295ec93cf0f38da637fcd91197ec0

    • SHA512

      33a25ecbdc8b4ba5f11fc7c508418936c462bf6b5a4f06c1377f17f8d275bd6ad81b1eb4a134154547497311c8a0c481158327643da0921d8897cc6929e9a5a9

    • SSDEEP

      98304:ZLu1FiRcinKNwFFClurxUTkCOS20BYql7x+oZHcV4i/kgE7/FG4l7zP3u+0xZHcq:ZUXcqG0vGfLgi

    • Panda Stealer payload

    • PandaStealer

      Panda Stealer is a fork of CollectorProject Stealer written in C++.

    • Pandastealer family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v16

Tasks