General
-
Target
2025-04-22_588b20c2228a04d7e38d165197e17c33_black-basta_cobalt-strike_elex_luca-stealer
-
Size
332KB
-
Sample
250422-qdrlqsznw9
-
MD5
588b20c2228a04d7e38d165197e17c33
-
SHA1
80889b9cf8a45e3676f5e540bd905504fe1ff1dd
-
SHA256
9e245ac611d0c3115922c0115e9307245f402062d8306dd06d5d121b05d1776f
-
SHA512
87c1ed70e5658e6ccfa6c7caa85f347e84babda9c5aac3f9afd8d70e2524ae45b92b50028fb08817b037ac66a0ad572c667ee0a10dc4d5e404fc855e85803a1d
-
SSDEEP
6144:iq9ezqsEC8dS7CCKUf+9xwL1ZTcDCzyrxQX3hVds+tfCOu3miq/R8iXq:i4JsE3CKUf+9xwL15cDCzie1ChALXq
Behavioral task
behavioral1
Sample
2025-04-22_588b20c2228a04d7e38d165197e17c33_black-basta_cobalt-strike_elex_luca-stealer.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
2025-04-22_588b20c2228a04d7e38d165197e17c33_black-basta_cobalt-strike_elex_luca-stealer.exe
Resource
win11-20250410-en
Malware Config
Extracted
C:\98e9ea07f139e046c8\How_to_back_files.html
Extracted
C:\96b4ed9c1ec205c2a0fbf7b228cf45\How_to_back_files.html
Targets
-
-
Target
2025-04-22_588b20c2228a04d7e38d165197e17c33_black-basta_cobalt-strike_elex_luca-stealer
-
Size
332KB
-
MD5
588b20c2228a04d7e38d165197e17c33
-
SHA1
80889b9cf8a45e3676f5e540bd905504fe1ff1dd
-
SHA256
9e245ac611d0c3115922c0115e9307245f402062d8306dd06d5d121b05d1776f
-
SHA512
87c1ed70e5658e6ccfa6c7caa85f347e84babda9c5aac3f9afd8d70e2524ae45b92b50028fb08817b037ac66a0ad572c667ee0a10dc4d5e404fc855e85803a1d
-
SSDEEP
6144:iq9ezqsEC8dS7CCKUf+9xwL1ZTcDCzyrxQX3hVds+tfCOu3miq/R8iXq:i4JsE3CKUf+9xwL15cDCzie1ChALXq
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Renames multiple (7203) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-