General
-
Target
2025-04-19_68ac90ee73d3a133e5e303f0c2fe0111_black-basta_cobalt-strike_satacom
-
Size
29.5MB
-
Sample
250419-qhvh7awybt
-
MD5
68ac90ee73d3a133e5e303f0c2fe0111
-
SHA1
6812d15dcab3630d701f9e8ec283af7c4dccb3f7
-
SHA256
5cd84384af45e00ec145a253c15769d13018f349a4cce4d07f95e558065202db
-
SHA512
007902856c78939b6c54bcb0cb1c5376cccd696a87d5cd0ffe83ae7aa37f6334accc0ad687a3de942da6ad6a1f923419914c8eee4766e17042427f107d690bf5
-
SSDEEP
786432:BtIuqEuqpZUlyW89prfX3OSlXdPXAbjlsoCXrCXFjp7/Y:BtIupuCWlyWsNP3lltPwjlsNbC9p0
Behavioral task
behavioral1
Sample
2025-04-19_68ac90ee73d3a133e5e303f0c2fe0111_black-basta_cobalt-strike_satacom.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
2025-04-19_68ac90ee73d3a133e5e303f0c2fe0111_black-basta_cobalt-strike_satacom.exe
Resource
win11-20250411-en
Malware Config
Targets
-
-
Target
2025-04-19_68ac90ee73d3a133e5e303f0c2fe0111_black-basta_cobalt-strike_satacom
-
Size
29.5MB
-
MD5
68ac90ee73d3a133e5e303f0c2fe0111
-
SHA1
6812d15dcab3630d701f9e8ec283af7c4dccb3f7
-
SHA256
5cd84384af45e00ec145a253c15769d13018f349a4cce4d07f95e558065202db
-
SHA512
007902856c78939b6c54bcb0cb1c5376cccd696a87d5cd0ffe83ae7aa37f6334accc0ad687a3de942da6ad6a1f923419914c8eee4766e17042427f107d690bf5
-
SSDEEP
786432:BtIuqEuqpZUlyW89prfX3OSlXdPXAbjlsoCXrCXFjp7/Y:BtIupuCWlyWsNP3lltPwjlsNbC9p0
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-