General
-
Target
2025-04-19_d5ba8d74d21b8f998b6d40abc208a9a6_black-basta_cobalt-strike_satacom
-
Size
10.3MB
-
Sample
250419-dmancsvqs3
-
MD5
d5ba8d74d21b8f998b6d40abc208a9a6
-
SHA1
f7337f1e873cbf28afab66c346f07a8ecc1d300a
-
SHA256
47e7bf5bff0cb8810af12259b059c93facd4e24e371fa3ce25087a274805014b
-
SHA512
677f7fb4409f17499e6becdd837799c93c9ae2f335983e08c76d9b3da384e91e15fdb98298f7de3a7c4b3e8ac53fe20319262f2eb88b2a8825477649970c87df
-
SSDEEP
196608:6YEljWOuXJWIj8KkUx2R4NzHdQmRJ8dA6lkaycBIGpEyW01Ve:IOJWQsUcR4NzHdQuslp9pW01M
Behavioral task
behavioral1
Sample
2025-04-19_d5ba8d74d21b8f998b6d40abc208a9a6_black-basta_cobalt-strike_satacom.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral2
Sample
2025-04-19_d5ba8d74d21b8f998b6d40abc208a9a6_black-basta_cobalt-strike_satacom.exe
Resource
win11-20250410-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\@[email protected]
wannacry
12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw
Targets
-
-
Target
2025-04-19_d5ba8d74d21b8f998b6d40abc208a9a6_black-basta_cobalt-strike_satacom
-
Size
10.3MB
-
MD5
d5ba8d74d21b8f998b6d40abc208a9a6
-
SHA1
f7337f1e873cbf28afab66c346f07a8ecc1d300a
-
SHA256
47e7bf5bff0cb8810af12259b059c93facd4e24e371fa3ce25087a274805014b
-
SHA512
677f7fb4409f17499e6becdd837799c93c9ae2f335983e08c76d9b3da384e91e15fdb98298f7de3a7c4b3e8ac53fe20319262f2eb88b2a8825477649970c87df
-
SSDEEP
196608:6YEljWOuXJWIj8KkUx2R4NzHdQmRJ8dA6lkaycBIGpEyW01Ve:IOJWQsUcR4NzHdQuslp9pW01M
-
Wannacry family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Legitimate hosting services abused for malware hosting/C2
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v16
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Indicator Removal
1File Deletion
1Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1