General

  • Target

    2025-05-08_09b8552d5057f3c78c646c3159846f6e_akira_cobalt-strike_rusty-stealer_satacom

  • Size

    12.2MB

  • Sample

    250508-g6lfrayxdt

  • MD5

    09b8552d5057f3c78c646c3159846f6e

  • SHA1

    7f27b99904deabc5f392748caa51efec0470d94c

  • SHA256

    49a646221cd170326383fa3c565da4e31652eba40114451a28834e49e5a4aa6c

  • SHA512

    9e75d563cf52ecd97394ba93c14a2246169ee5df77c7bb1bf6cc9c847354ea2d1e0c490ce6ce16045996816000aa7ce668ac162a0f60b7855629ad97765d7beb

  • SSDEEP

    98304:XKfVOLEAvLmcpVoPtC9H72kKZVR8wVQBrEwcPuyGfL1w+xVkn/ru+X5/flzBYQ8:XKf8TmcpetCN2H8BY2JvUj8

Malware Config

Targets

    • Target

      2025-05-08_09b8552d5057f3c78c646c3159846f6e_akira_cobalt-strike_rusty-stealer_satacom

    • Size

      12.2MB

    • MD5

      09b8552d5057f3c78c646c3159846f6e

    • SHA1

      7f27b99904deabc5f392748caa51efec0470d94c

    • SHA256

      49a646221cd170326383fa3c565da4e31652eba40114451a28834e49e5a4aa6c

    • SHA512

      9e75d563cf52ecd97394ba93c14a2246169ee5df77c7bb1bf6cc9c847354ea2d1e0c490ce6ce16045996816000aa7ce668ac162a0f60b7855629ad97765d7beb

    • SSDEEP

      98304:XKfVOLEAvLmcpVoPtC9H72kKZVR8wVQBrEwcPuyGfL1w+xVkn/ru+X5/flzBYQ8:XKf8TmcpetCN2H8BY2JvUj8

    • Checks whether UAC is enabled

    • Network Share Discovery

      Attempt to gather information on host network.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to get system information.

MITRE ATT&CK Enterprise v16

Tasks

OSZAR »