General
-
Target
2025-06-30_1ce75d817eaaca5787579f2c666438f6_black-basta_elex_hijackloader
-
Size
4.1MB
-
Sample
250630-vcwlhstlx4
-
MD5
1ce75d817eaaca5787579f2c666438f6
-
SHA1
15bd3b5189424bfdb349b46bcbdfe5dd531f914f
-
SHA256
5191145708a2ff5f02fa24ce2cb9e6467a11c446cceb6a2b52bc72c3f76b7fad
-
SHA512
ac6fdb6b3e296b14e3e42b19703477fa07145da79dc02e69dbaa9a48cf9bc491a42ac74abcf0a7b7b2bbe7af3e660d95fd57116412f28687db9a297c18a3e10f
-
SSDEEP
49152:8yEKQ5E3ieGR0PEtBFUow1b89eX61L+2xmepn/TRijbqYW3qkCbDypSfe6qwiXE3:2q9ceq9+2xl/SSay+
Static task
static1
Behavioral task
behavioral1
Sample
2025-06-30_1ce75d817eaaca5787579f2c666438f6_black-basta_elex_hijackloader.exe
Resource
win10v2004-20250619-en
Malware Config
Targets
-
-
Target
2025-06-30_1ce75d817eaaca5787579f2c666438f6_black-basta_elex_hijackloader
-
Size
4.1MB
-
MD5
1ce75d817eaaca5787579f2c666438f6
-
SHA1
15bd3b5189424bfdb349b46bcbdfe5dd531f914f
-
SHA256
5191145708a2ff5f02fa24ce2cb9e6467a11c446cceb6a2b52bc72c3f76b7fad
-
SHA512
ac6fdb6b3e296b14e3e42b19703477fa07145da79dc02e69dbaa9a48cf9bc491a42ac74abcf0a7b7b2bbe7af3e660d95fd57116412f28687db9a297c18a3e10f
-
SSDEEP
49152:8yEKQ5E3ieGR0PEtBFUow1b89eX61L+2xmepn/TRijbqYW3qkCbDypSfe6qwiXE3:2q9ceq9+2xl/SSay+
-
Drops startup file
-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v16
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1