General

  • Target

    2025-07-04_04c2c4f931e6dea0521220dd73044d97_black-basta_elex_hijackloader

  • Size

    3.5MB

  • Sample

    250704-pp6pcssydz

  • MD5

    04c2c4f931e6dea0521220dd73044d97

  • SHA1

    3af1fda6f26f3404d8a9f0eebeaf111e81098a5c

  • SHA256

    0dd0a7bbd280ff5a36cb482f512c6253da85c81569cfa36d79986be87f2ebfb3

  • SHA512

    99d16a313234d113adde9595dfab954f492b2ec44aa25ef137abe516afd047a5eb17d3735fa4d4eeea26e34e04abe7dfbebf118b62b3ae06a0a5fc740689aaa5

  • SSDEEP

    49152:0dU5tzuM0S2S5mLFEuVebedv9uNBb8AftK9qrO1LS9RhSq15vTNuHv/QXd9CQxMo:0dUCFk/fUqrOiOc5z

Malware Config

Targets

    • Target

      2025-07-04_04c2c4f931e6dea0521220dd73044d97_black-basta_elex_hijackloader

    • Size

      3.5MB

    • MD5

      04c2c4f931e6dea0521220dd73044d97

    • SHA1

      3af1fda6f26f3404d8a9f0eebeaf111e81098a5c

    • SHA256

      0dd0a7bbd280ff5a36cb482f512c6253da85c81569cfa36d79986be87f2ebfb3

    • SHA512

      99d16a313234d113adde9595dfab954f492b2ec44aa25ef137abe516afd047a5eb17d3735fa4d4eeea26e34e04abe7dfbebf118b62b3ae06a0a5fc740689aaa5

    • SSDEEP

      49152:0dU5tzuM0S2S5mLFEuVebedv9uNBb8AftK9qrO1LS9RhSq15vTNuHv/QXd9CQxMo:0dUCFk/fUqrOiOc5z

    • Drops file in Drivers directory

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v16

Tasks