General

  • Target

    2025-04-19_68ac90ee73d3a133e5e303f0c2fe0111_black-basta_cobalt-strike_satacom

  • Size

    29.5MB

  • Sample

    250419-qhvh7awybt

  • MD5

    68ac90ee73d3a133e5e303f0c2fe0111

  • SHA1

    6812d15dcab3630d701f9e8ec283af7c4dccb3f7

  • SHA256

    5cd84384af45e00ec145a253c15769d13018f349a4cce4d07f95e558065202db

  • SHA512

    007902856c78939b6c54bcb0cb1c5376cccd696a87d5cd0ffe83ae7aa37f6334accc0ad687a3de942da6ad6a1f923419914c8eee4766e17042427f107d690bf5

  • SSDEEP

    786432:BtIuqEuqpZUlyW89prfX3OSlXdPXAbjlsoCXrCXFjp7/Y:BtIupuCWlyWsNP3lltPwjlsNbC9p0

Malware Config

Targets

    • Target

      2025-04-19_68ac90ee73d3a133e5e303f0c2fe0111_black-basta_cobalt-strike_satacom

    • Size

      29.5MB

    • MD5

      68ac90ee73d3a133e5e303f0c2fe0111

    • SHA1

      6812d15dcab3630d701f9e8ec283af7c4dccb3f7

    • SHA256

      5cd84384af45e00ec145a253c15769d13018f349a4cce4d07f95e558065202db

    • SHA512

      007902856c78939b6c54bcb0cb1c5376cccd696a87d5cd0ffe83ae7aa37f6334accc0ad687a3de942da6ad6a1f923419914c8eee4766e17042427f107d690bf5

    • SSDEEP

      786432:BtIuqEuqpZUlyW89prfX3OSlXdPXAbjlsoCXrCXFjp7/Y:BtIupuCWlyWsNP3lltPwjlsNbC9p0

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v16

Tasks