General
-
Target
2025-05-08_36869ee9e3128724bd8dc18a35fa73d6_black-basta_cobalt-strike_ryuk_satacom
-
Size
1.1MB
-
Sample
250508-fjdlysysh1
-
MD5
36869ee9e3128724bd8dc18a35fa73d6
-
SHA1
b14dd8879e3189e0075c3147c8a4c85c7e2cc043
-
SHA256
4543e3e46423dc20405590a8cd17529d5e057f2a3e33fb63a154af9b799cca30
-
SHA512
dfec00bed9d02a5fba8461a3298602bec7e6fc5a9bfa8aab4749c60aafabb40a97cb4a293f2193ca3c7c11f6460fe6eabaead028a20a9d847a243a224d961173
-
SSDEEP
12288:A3VBED7WEv7+rJU6kxdQwf8/11Dyf0vOqCei7ZWPLCvvmlTJ7tf0vOqCei7ZWPLt:AXEfv7+Ehsuh7s+mLJsuh7s+mL
Static task
static1
Behavioral task
behavioral1
Sample
2025-05-08_36869ee9e3128724bd8dc18a35fa73d6_black-basta_cobalt-strike_ryuk_satacom.exe
Resource
win10v2004-20250502-en
Malware Config
Extracted
lumma
https://faeneasq.live/nmgj
https://orjinalecza.net/lxaz
https://eczakozmetik.net/qop
https://orijinalecza.org/jub
https://tortoisgfe.top/paxk
https://8eczamedikal.org/vax
https://orijinalecza.net/kazd
https://medicalbitkisel.net/juj
https://snakejh.top/adsk
Targets
-
-
Target
2025-05-08_36869ee9e3128724bd8dc18a35fa73d6_black-basta_cobalt-strike_ryuk_satacom
-
Size
1.1MB
-
MD5
36869ee9e3128724bd8dc18a35fa73d6
-
SHA1
b14dd8879e3189e0075c3147c8a4c85c7e2cc043
-
SHA256
4543e3e46423dc20405590a8cd17529d5e057f2a3e33fb63a154af9b799cca30
-
SHA512
dfec00bed9d02a5fba8461a3298602bec7e6fc5a9bfa8aab4749c60aafabb40a97cb4a293f2193ca3c7c11f6460fe6eabaead028a20a9d847a243a224d961173
-
SSDEEP
12288:A3VBED7WEv7+rJU6kxdQwf8/11Dyf0vOqCei7ZWPLCvvmlTJ7tf0vOqCei7ZWPLt:AXEfv7+Ehsuh7s+mLJsuh7s+mL
-
Lumma family
-
Suspicious use of SetThreadContext
-