General

  • Target

    2025-04-17_0a3edadff6d12022fafb80baec723ccb_black-basta_cobalt-strike_satacom

  • Size

    10.3MB

  • Sample

    250417-t3aajaxjv7

  • MD5

    0a3edadff6d12022fafb80baec723ccb

  • SHA1

    1ddc0debbec77622aa38cd3e29aae84aaffb48c1

  • SHA256

    57dae75bcad8a3a9fd2131fa7aa8862d19ef8f0a00e18c78ddce2bb782bc70d3

  • SHA512

    624cd419db59472e288d638da371ed4fbdba72335c85e3f5bec4e8c80ff4ea9fe46ccddfd1fa1c4d93ff076374884c96e669e3b58aeab5eebb31d9e2098c5d50

  • SSDEEP

    196608:qG9SpT24iMqWNo2mtKVQA1HeT39IigaeE9TFa0Z8DOjCdylA5Qy3eiD:i2JtWNhqKVp1+TtIiEY9Z8D8CclAW4D

Malware Config

Targets

    • Target

      2025-04-17_0a3edadff6d12022fafb80baec723ccb_black-basta_cobalt-strike_satacom

    • Size

      10.3MB

    • MD5

      0a3edadff6d12022fafb80baec723ccb

    • SHA1

      1ddc0debbec77622aa38cd3e29aae84aaffb48c1

    • SHA256

      57dae75bcad8a3a9fd2131fa7aa8862d19ef8f0a00e18c78ddce2bb782bc70d3

    • SHA512

      624cd419db59472e288d638da371ed4fbdba72335c85e3f5bec4e8c80ff4ea9fe46ccddfd1fa1c4d93ff076374884c96e669e3b58aeab5eebb31d9e2098c5d50

    • SSDEEP

      196608:qG9SpT24iMqWNo2mtKVQA1HeT39IigaeE9TFa0Z8DOjCdylA5Qy3eiD:i2JtWNhqKVp1+TtIiEY9Z8D8CclAW4D

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v16

Tasks