General

  • Target

    2025-06-30_1ce75d817eaaca5787579f2c666438f6_black-basta_elex_hijackloader

  • Size

    4.1MB

  • Sample

    250630-vcwlhstlx4

  • MD5

    1ce75d817eaaca5787579f2c666438f6

  • SHA1

    15bd3b5189424bfdb349b46bcbdfe5dd531f914f

  • SHA256

    5191145708a2ff5f02fa24ce2cb9e6467a11c446cceb6a2b52bc72c3f76b7fad

  • SHA512

    ac6fdb6b3e296b14e3e42b19703477fa07145da79dc02e69dbaa9a48cf9bc491a42ac74abcf0a7b7b2bbe7af3e660d95fd57116412f28687db9a297c18a3e10f

  • SSDEEP

    49152:8yEKQ5E3ieGR0PEtBFUow1b89eX61L+2xmepn/TRijbqYW3qkCbDypSfe6qwiXE3:2q9ceq9+2xl/SSay+

Malware Config

Targets

    • Target

      2025-06-30_1ce75d817eaaca5787579f2c666438f6_black-basta_elex_hijackloader

    • Size

      4.1MB

    • MD5

      1ce75d817eaaca5787579f2c666438f6

    • SHA1

      15bd3b5189424bfdb349b46bcbdfe5dd531f914f

    • SHA256

      5191145708a2ff5f02fa24ce2cb9e6467a11c446cceb6a2b52bc72c3f76b7fad

    • SHA512

      ac6fdb6b3e296b14e3e42b19703477fa07145da79dc02e69dbaa9a48cf9bc491a42ac74abcf0a7b7b2bbe7af3e660d95fd57116412f28687db9a297c18a3e10f

    • SSDEEP

      49152:8yEKQ5E3ieGR0PEtBFUow1b89eX61L+2xmepn/TRijbqYW3qkCbDypSfe6qwiXE3:2q9ceq9+2xl/SSay+

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v16

Tasks