General

  • Target

    2025-05-08_40198b3cd38c4d020d8851c0878717d4_akira_cobalt-strike_rusty-stealer_satacom

  • Size

    12.2MB

  • Sample

    250508-kb2e9szsh1

  • MD5

    40198b3cd38c4d020d8851c0878717d4

  • SHA1

    304ac29f3a2b5ec4adf8eed4a4cccad5a32fb319

  • SHA256

    c17d91b4dd5ade875c4f2bdb4af39cea4fada52a5bf8499ebb46cdb3a9e66842

  • SHA512

    4e79af955c085f6532d8b4dbeba4a9c00c2d5de379ce6a297c697f70f143dfc934e376a09bd6fd24bc440d14dd3a37b96581c6d45324a309c13b9d60c67df915

  • SSDEEP

    98304:t2RxwPGHz+1ikmTlXmXDkeekPkx8XMaiPuyGfeQB0KLfyDXSNlwLsZ6+YWfA:wRCuHC1idTlXmqaVxdBLMgZ6Z

Malware Config

Targets

    • Target

      2025-05-08_40198b3cd38c4d020d8851c0878717d4_akira_cobalt-strike_rusty-stealer_satacom

    • Size

      12.2MB

    • MD5

      40198b3cd38c4d020d8851c0878717d4

    • SHA1

      304ac29f3a2b5ec4adf8eed4a4cccad5a32fb319

    • SHA256

      c17d91b4dd5ade875c4f2bdb4af39cea4fada52a5bf8499ebb46cdb3a9e66842

    • SHA512

      4e79af955c085f6532d8b4dbeba4a9c00c2d5de379ce6a297c697f70f143dfc934e376a09bd6fd24bc440d14dd3a37b96581c6d45324a309c13b9d60c67df915

    • SSDEEP

      98304:t2RxwPGHz+1ikmTlXmXDkeekPkx8XMaiPuyGfeQB0KLfyDXSNlwLsZ6+YWfA:wRCuHC1idTlXmqaVxdBLMgZ6Z

    • Checks whether UAC is enabled

    • Network Share Discovery

      Attempt to gather information on host network.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to get system information.

MITRE ATT&CK Enterprise v16

Tasks

OSZAR »