General
-
Target
2025-04-17_0a3edadff6d12022fafb80baec723ccb_black-basta_cobalt-strike_satacom
-
Size
10.3MB
-
Sample
250417-t3aajaxjv7
-
MD5
0a3edadff6d12022fafb80baec723ccb
-
SHA1
1ddc0debbec77622aa38cd3e29aae84aaffb48c1
-
SHA256
57dae75bcad8a3a9fd2131fa7aa8862d19ef8f0a00e18c78ddce2bb782bc70d3
-
SHA512
624cd419db59472e288d638da371ed4fbdba72335c85e3f5bec4e8c80ff4ea9fe46ccddfd1fa1c4d93ff076374884c96e669e3b58aeab5eebb31d9e2098c5d50
-
SSDEEP
196608:qG9SpT24iMqWNo2mtKVQA1HeT39IigaeE9TFa0Z8DOjCdylA5Qy3eiD:i2JtWNhqKVp1+TtIiEY9Z8D8CclAW4D
Behavioral task
behavioral1
Sample
2025-04-17_0a3edadff6d12022fafb80baec723ccb_black-basta_cobalt-strike_satacom.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
2025-04-17_0a3edadff6d12022fafb80baec723ccb_black-basta_cobalt-strike_satacom.exe
Resource
win11-20250410-en
Malware Config
Targets
-
-
Target
2025-04-17_0a3edadff6d12022fafb80baec723ccb_black-basta_cobalt-strike_satacom
-
Size
10.3MB
-
MD5
0a3edadff6d12022fafb80baec723ccb
-
SHA1
1ddc0debbec77622aa38cd3e29aae84aaffb48c1
-
SHA256
57dae75bcad8a3a9fd2131fa7aa8862d19ef8f0a00e18c78ddce2bb782bc70d3
-
SHA512
624cd419db59472e288d638da371ed4fbdba72335c85e3f5bec4e8c80ff4ea9fe46ccddfd1fa1c4d93ff076374884c96e669e3b58aeab5eebb31d9e2098c5d50
-
SSDEEP
196608:qG9SpT24iMqWNo2mtKVQA1HeT39IigaeE9TFa0Z8DOjCdylA5Qy3eiD:i2JtWNhqKVp1+TtIiEY9Z8D8CclAW4D
-
StormKitty payload
-
Stormkitty family
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v16
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Modify Authentication Process
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2