General
-
Target
2025-05-16_43d04a9df9c0ca6331892a68b9b417a1_black-basta_cobalt-strike_ryuk_satacom
-
Size
717KB
-
Sample
250516-hd8k9aar5s
-
MD5
43d04a9df9c0ca6331892a68b9b417a1
-
SHA1
c6412605255f4b23a5f84bfacb788f776704224b
-
SHA256
6e42af11459ad4b401ec0a953ccfbad353662da1fee99c07b90050a141cbb4d4
-
SHA512
3864be3bc5935728ee46dd677b10764545a8558645e0c2519e31a5ef4badd95de15c53b86d1f5b9b5397cb1d1dc95d5c4cb88489c3a6e456691294937c351250
-
SSDEEP
12288:wQdkVm4hnVkT2X1ZFCDjZarKfU+SOvLwkhkEvTolrAtKfU+SOvLwkhkEvTolrAT:YnzMjfrSOjbJvMlrAAfrSOjbJvMlrAT
Static task
static1
Behavioral task
behavioral1
Sample
2025-05-16_43d04a9df9c0ca6331892a68b9b417a1_black-basta_cobalt-strike_ryuk_satacom.exe
Resource
win10v2004-20250502-en
Malware Config
Extracted
vidar
13.7
1ef8146d724a33824358ccb91558f39c
https://t.me/eom25h
https://steamcommunity.com/profiles/76561199855598339
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/135.0.0.0 Safari/537.36 OPR/120.0.0.0
Extracted
xworm
94.26.90.81:2404
-
Install_directory
%AppData%
-
install_file
Edge Browser.exe
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
HacKed
213.209.150.210:7773
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Targets
-
-
Target
2025-05-16_43d04a9df9c0ca6331892a68b9b417a1_black-basta_cobalt-strike_ryuk_satacom
-
Size
717KB
-
MD5
43d04a9df9c0ca6331892a68b9b417a1
-
SHA1
c6412605255f4b23a5f84bfacb788f776704224b
-
SHA256
6e42af11459ad4b401ec0a953ccfbad353662da1fee99c07b90050a141cbb4d4
-
SHA512
3864be3bc5935728ee46dd677b10764545a8558645e0c2519e31a5ef4badd95de15c53b86d1f5b9b5397cb1d1dc95d5c4cb88489c3a6e456691294937c351250
-
SSDEEP
12288:wQdkVm4hnVkT2X1ZFCDjZarKfU+SOvLwkhkEvTolrAtKfU+SOvLwkhkEvTolrAT:YnzMjfrSOjbJvMlrAAfrSOjbJvMlrAT
-
Detect Vidar Stealer
-
Detect Xworm Payload
-
Njrat family
-
Vidar family
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v16
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Authentication Process
1Modify Registry
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2