General
-
Target
2025-04-17_e9a4da7003603ce1d5045a8c7b44611d_black-basta_cobalt-strike_ryuk_satacom
-
Size
1.3MB
-
Sample
250417-wvdzvsxzhw
-
MD5
e9a4da7003603ce1d5045a8c7b44611d
-
SHA1
5b51f43b8d16dea516abc5cf3231042a10ecf09c
-
SHA256
bcba841ec1c29c8febe31bd52a06da1bbd88faa7aafca3c88aed068d83e07783
-
SHA512
026432c88637fa22e2a1bb723d90249d1803e9f01f31d61bbd023198bdfe2304e279a954c07fbc92977f59453ab612a41630111845416f23ed4075fc7157e70f
-
SSDEEP
24576:pXfINFPFU9z/46aw5vHZnWHItRf4fYRE7BHlcADadfj/EIS6CwvhYt4zju+p0juY:pXfINtFU9z/46aw5vHZnWHItRf4Qy7BR
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-17_e9a4da7003603ce1d5045a8c7b44611d_black-basta_cobalt-strike_ryuk_satacom.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
2025-04-17_e9a4da7003603ce1d5045a8c7b44611d_black-basta_cobalt-strike_ryuk_satacom.exe
Resource
win11-20250410-en
Malware Config
Extracted
vidar
13.4
05384aad30607e06c3d580d2ad87a31d
https://t.me/f07nd
https://steamcommunity.com/profiles/76561199843252735
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0
Targets
-
-
Target
2025-04-17_e9a4da7003603ce1d5045a8c7b44611d_black-basta_cobalt-strike_ryuk_satacom
-
Size
1.3MB
-
MD5
e9a4da7003603ce1d5045a8c7b44611d
-
SHA1
5b51f43b8d16dea516abc5cf3231042a10ecf09c
-
SHA256
bcba841ec1c29c8febe31bd52a06da1bbd88faa7aafca3c88aed068d83e07783
-
SHA512
026432c88637fa22e2a1bb723d90249d1803e9f01f31d61bbd023198bdfe2304e279a954c07fbc92977f59453ab612a41630111845416f23ed4075fc7157e70f
-
SSDEEP
24576:pXfINFPFU9z/46aw5vHZnWHItRf4fYRE7BHlcADadfj/EIS6CwvhYt4zju+p0juY:pXfINtFU9z/46aw5vHZnWHItRf4Qy7BR
-
Detect Vidar Stealer
-
Vidar family
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v16
Credential Access
Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2