General

  • Target

    2025-05-08_d7057134c8f3886a7275c6c549597754_akira_cobalt-strike_rusty-stealer_satacom

  • Size

    12.3MB

  • Sample

    250508-kh3a5scm6z

  • MD5

    d7057134c8f3886a7275c6c549597754

  • SHA1

    7df6ef5920533f18b5f03589d5cf250bdb6bc5fb

  • SHA256

    fb762dbd67b05c98f8e0ed027fe24b4b58efe171401c0369fc05950bb41747ca

  • SHA512

    8061413f2db0548b4e84c0cdb40284cf8817e81056fdb4dbdb996b022b2d18d244e37690d8b2b7e5224f7e1570a729a815d131a9ee759ab4df452659c8c2fd33

  • SSDEEP

    98304:Cp8Ol1uD7YAQKUIfkGRU5NgHYQBrEwYPuyGfCt5zMBno6oYs5SoN8:Cp8FD7tQKHywBY4bBi

Malware Config

Targets

    • Target

      2025-05-08_d7057134c8f3886a7275c6c549597754_akira_cobalt-strike_rusty-stealer_satacom

    • Size

      12.3MB

    • MD5

      d7057134c8f3886a7275c6c549597754

    • SHA1

      7df6ef5920533f18b5f03589d5cf250bdb6bc5fb

    • SHA256

      fb762dbd67b05c98f8e0ed027fe24b4b58efe171401c0369fc05950bb41747ca

    • SHA512

      8061413f2db0548b4e84c0cdb40284cf8817e81056fdb4dbdb996b022b2d18d244e37690d8b2b7e5224f7e1570a729a815d131a9ee759ab4df452659c8c2fd33

    • SSDEEP

      98304:Cp8Ol1uD7YAQKUIfkGRU5NgHYQBrEwYPuyGfCt5zMBno6oYs5SoN8:Cp8FD7tQKHywBY4bBi

    • Checks whether UAC is enabled

    • Network Share Discovery

      Attempt to gather information on host network.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to get system information.

MITRE ATT&CK Enterprise v16

Tasks

OSZAR »