File name: | 2025-07-06_f6fd3e8da755519b64fbd2e3f7557871_black-basta_cobalt-strike_luca-stealer_satacom_vidar |
Full analysis: | https://app.any.run/tasks/9dce3d80-64e1-44a9-a7db-bf7e589f8da3 |
Verdict: | Malicious activity |
Threats: | Blank Grabber is an infostealer written in Python. It is designed to steal a wide array of data, such as browser login credentials, crypto wallets, Telegram sessions, and Discord tokens. It is an open-source malware, with its code available on GitHub and regularly receiving updates. Blank Grabber builder’s simple interface lets threat actors even with basic skills to deploy it and conduct attacks. |
Analysis date: | July 06, 2025, 03:58:29 |
OS: | Windows 10 Professional (build: 19044, 64 bit) |
Tags: | |
Indicators: | |
MIME: | application/vnd.microsoft.portable-executable |
File info: | PE32+ executable (GUI) x86-64, for MS Windows, 7 sections |
MD5: | F6FD3E8DA755519B64FBD2E3F7557871 |
SHA1: | 598F34CAA508110FFBF5A18B9491C0ED9CE242F1 |
SHA256: | F2D78EA65B00E6C337C5114DCA7C7DC5D21D0A41BF1EE1E2DFBC9BD1E655E1DB |
SSDEEP: | 98304:01T2QUFSktLnSLBhAfJ+rhVgCgxLOWNNVTVXniIYkoaSFz/vjaIHqBcU4zhuFZpN:TciC5o8UpbrG8Nb8kg6lMA |
.exe | | | Win64 Executable (generic) (87.3) |
---|---|---|
.exe | | | Generic Win/DOS Executable (6.3) |
.exe | | | DOS Executable Generic (6.3) |
MachineType: | AMD AMD64 |
---|---|
TimeStamp: | 2025:07:04 19:48:27+00:00 |
ImageFileCharacteristics: | Executable, Large address aware |
PEType: | PE32+ |
LinkerVersion: | 14.42 |
CodeSize: | 173568 |
InitializedDataSize: | 184832 |
UninitializedDataSize: | - |
EntryPoint: | 0xce20 |
OSVersion: | 6 |
ImageVersion: | - |
SubsystemVersion: | 6 |
Subsystem: | Windows GUI |
FileVersionNumber: | 10.0.26100.4484 |
ProductVersionNumber: | 10.0.26100.4484 |
FileFlagsMask: | 0x003f |
FileFlags: | (none) |
FileOS: | Windows NT 32-bit |
ObjectFileType: | Dynamic link library |
FileSubtype: | - |
LanguageCode: | English (U.S.) |
CharacterSet: | Unicode |
CompanyName: | Microsoft Corporation |
FileDescription: | Device Association Framework Provider Host |
FileVersion: | 10.0.26100.4484 (WinBuild.160101.0800) |
InternalName: | dasHost.exe |
LegalCopyright: | © Microsoft Corporation. All rights reserved. |
OriginalFileName: | dasHost.exe |
ProductName: | Microsoft® Windows® Operating System |
ProductVersion: | 10.0.26100.4484 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
432 | powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\admin\Desktop\2025-07-06_f6fd3e8da755519b64fbd2e3f7557871_black-basta_cobalt-strike_luca-stealer_satacom_vidar.exe' | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
640 | C:\WINDOWS\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2" | C:\Windows\System32\cmd.exe | — | 2025-07-06_f6fd3e8da755519b64fbd2e3f7557871_black-basta_cobalt-strike_luca-stealer_satacom_vidar.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
768 | C:\WINDOWS\system32\cmd.exe /c "tasklist /FO LIST" | C:\Windows\System32\cmd.exe | — | 2025-07-06_f6fd3e8da755519b64fbd2e3f7557871_black-basta_cobalt-strike_luca-stealer_satacom_vidar.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
892 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
952 | C:\WINDOWS\system32\cmd.exe /c "wmic csproduct get uuid" | C:\Windows\System32\cmd.exe | — | 2025-07-06_f6fd3e8da755519b64fbd2e3f7557871_black-basta_cobalt-strike_luca-stealer_satacom_vidar.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
952 | C:\WINDOWS\system32\cmd.exe /c "tasklist /FO LIST" | C:\Windows\System32\cmd.exe | — | 2025-07-06_f6fd3e8da755519b64fbd2e3f7557871_black-basta_cobalt-strike_luca-stealer_satacom_vidar.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
1324 | REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2 | C:\Windows\System32\reg.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Registry Console Tool Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
1324 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
1468 | C:\WINDOWS\system32\cmd.exe /c "wmic path win32_VideoController get name" | C:\Windows\System32\cmd.exe | — | 2025-07-06_f6fd3e8da755519b64fbd2e3f7557871_black-basta_cobalt-strike_luca-stealer_satacom_vidar.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
1612 | tasklist /FO LIST | C:\Windows\System32\tasklist.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Lists the current running tasks Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
|
(PID) Process: | (2272) 2025-07-06_f6fd3e8da755519b64fbd2e3f7557871_black-basta_cobalt-strike_luca-stealer_satacom_vidar.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Multimedia\DrawDib |
Operation: | write | Name: | 1280x720x32(BGR 0) |
Value: 31,31,31,31 | |||
(PID) Process: | (6424) TiWorker.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing |
Operation: | write | Name: | SessionIdHigh |
Value: 31190570 | |||
(PID) Process: | (6424) TiWorker.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing |
Operation: | write | Name: | SessionIdLow |
Value: |
PID | Process | Filename | Type | |
---|---|---|---|---|
6404 | 2025-07-06_f6fd3e8da755519b64fbd2e3f7557871_black-basta_cobalt-strike_luca-stealer_satacom_vidar.exe | C:\Users\admin\AppData\Local\Temp\_MEI64042\_lzma.pyd | executable | |
MD5:542EAB18252D569C8ABEF7C58D303547 | SHA256:D2A7111FEEAACAC8B3A71727482565C46141CC7A5A3D837D8349166BEA5054C9 | |||
6404 | 2025-07-06_f6fd3e8da755519b64fbd2e3f7557871_black-basta_cobalt-strike_luca-stealer_satacom_vidar.exe | C:\Users\admin\AppData\Local\Temp\_MEI64042\_bz2.pyd | executable | |
MD5:C413931B63DEF8C71374D7826FBF3AB4 | SHA256:17BFA656CABF7EF75741003497A1C315B10237805FF171D44625A04C16532293 | |||
6404 | 2025-07-06_f6fd3e8da755519b64fbd2e3f7557871_black-basta_cobalt-strike_luca-stealer_satacom_vidar.exe | C:\Users\admin\AppData\Local\Temp\_MEI64042\_ctypes.pyd | executable | |
MD5:00F75DAAA7F8A897F2A330E00FAD78AC | SHA256:9FFADCB2C40AE6B67AB611ACC09E050BBE544672CF05E8402A7AA3936326DE1F | |||
6404 | 2025-07-06_f6fd3e8da755519b64fbd2e3f7557871_black-basta_cobalt-strike_luca-stealer_satacom_vidar.exe | C:\Users\admin\AppData\Local\Temp\_MEI64042\_ssl.pyd | executable | |
MD5:F9CC7385B4617DF1DDF030F594F37323 | SHA256:B093AA2E84A30790ABEEE82CF32A7C2209978D862451F1E0B0786C4D22833CB6 | |||
6404 | 2025-07-06_f6fd3e8da755519b64fbd2e3f7557871_black-basta_cobalt-strike_luca-stealer_satacom_vidar.exe | C:\Users\admin\AppData\Local\Temp\_MEI64042\libcrypto-3.dll | executable | |
MD5:78EBD9CB6709D939E4E0F2A6BBB80DA9 | SHA256:6A8C458E3D96F8DD3BF6D3CACC035E38EDF7F127EEE5563B51F8C8790CED0B3E | |||
6404 | 2025-07-06_f6fd3e8da755519b64fbd2e3f7557871_black-basta_cobalt-strike_luca-stealer_satacom_vidar.exe | C:\Users\admin\AppData\Local\Temp\_MEI64042\_queue.pyd | executable | |
MD5:347D6A8C2D48003301032546C140C145 | SHA256:E71803913B57C49F4CE3416EC15DC8A9E5C14F8675209624E76CD71B0319B192 | |||
6404 | 2025-07-06_f6fd3e8da755519b64fbd2e3f7557871_black-basta_cobalt-strike_luca-stealer_satacom_vidar.exe | C:\Users\admin\AppData\Local\Temp\_MEI64042\_socket.pyd | executable | |
MD5:1A34253AA7C77F9534561DC66AC5CF49 | SHA256:DC03D32F681634E682B02E9A60FDFCE420DB9F26754AEFB9A58654A064DC0F9F | |||
6404 | 2025-07-06_f6fd3e8da755519b64fbd2e3f7557871_black-basta_cobalt-strike_luca-stealer_satacom_vidar.exe | C:\Users\admin\AppData\Local\Temp\_MEI64042\_sqlite3.pyd | executable | |
MD5:1A8FDC36F7138EDCC84EE506C5EC9B92 | SHA256:8E4B9DA9C95915E864C89856E2D7671CD888028578A623E761AEAC2FECA04882 | |||
6404 | 2025-07-06_f6fd3e8da755519b64fbd2e3f7557871_black-basta_cobalt-strike_luca-stealer_satacom_vidar.exe | C:\Users\admin\AppData\Local\Temp\_MEI64042\VCRUNTIME140.dll | executable | |
MD5:49C96CECDA5C6C660A107D378FDFC3D4 | SHA256:69320F278D90EFAAEB67E2A1B55E5B0543883125834C812C8D9C39676E0494FC | |||
6404 | 2025-07-06_f6fd3e8da755519b64fbd2e3f7557871_black-basta_cobalt-strike_luca-stealer_satacom_vidar.exe | C:\Users\admin\AppData\Local\Temp\_MEI64042\_decimal.pyd | executable | |
MD5:E3FB8BF23D857B1EB860923CCC47BAA5 | SHA256:7DA13DF1F416D3FFD32843C895948E460AF4DC02CF05C521909555061ED108E3 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
— | — | GET | 204 | 142.250.184.227:443 | https://gstatic.com/generate_204 | unknown | — | — | — |
— | — | POST | 400 | 40.126.31.67:443 | https://login.live.com/ppsecure/deviceaddcredential.srf | unknown | text | 203 b | whitelisted |
— | — | POST | 400 | 40.126.32.133:443 | https://login.live.com/ppsecure/deviceaddcredential.srf | unknown | text | 203 b | whitelisted |
— | — | POST | 200 | 40.126.32.133:443 | https://login.live.com/RST2.srf | unknown | xml | 1.24 Kb | whitelisted |
— | — | POST | 400 | 40.126.31.67:443 | https://login.live.com/ppsecure/deviceaddcredential.srf | unknown | text | 203 b | whitelisted |
— | — | POST | 400 | 40.126.31.128:443 | https://login.live.com/ppsecure/deviceaddcredential.srf | unknown | text | 203 b | whitelisted |
— | — | GET | 304 | 52.149.20.212:443 | https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL | unknown | — | — | — |
— | — | POST | 404 | 162.159.138.232:443 | https://discord.com/api/webhooks/1390775328233754624/3EkVPAaG9HeWyZOP0HO2X2sVUBm6hv53qnH9JhmEqM2FnrJXsL35dXoOqNc2YM-ocwGR | unknown | binary | 45 b | whitelisted |
1028 | SIHClient.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl | unknown | — | — | whitelisted |
2272 | 2025-07-06_f6fd3e8da755519b64fbd2e3f7557871_black-basta_cobalt-strike_luca-stealer_satacom_vidar.exe | GET | 200 | 208.95.112.1:80 | http://ip-api.com/json/?fields=225545 | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | 23.216.77.28:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
1268 | svchost.exe | 23.216.77.28:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
— | — | 23.216.77.28:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
5944 | MoUsoCoreWorker.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
1268 | svchost.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
— | — | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
5944 | MoUsoCoreWorker.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
Domain | IP | Reputation |
---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
blank-c4zdo.in |
| unknown |
ip-api.com |
| whitelisted |
gstatic.com |
| whitelisted |
login.live.com |
| whitelisted |
nexusrules.officeapps.live.com |
| whitelisted |
discord.com |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
— | — | Device Retrieving External IP Address Detected | ET INFO External IP Lookup ip-api.com |
— | — | Device Retrieving External IP Address Detected | ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com) |
— | — | Device Retrieving External IP Address Detected | INFO [ANY.RUN] External IP Check (ip-api .com) |
— | — | Misc activity | ET INFO Observed Discord Domain in DNS Lookup (discord .com) |
— | — | Misc activity | ET INFO Observed Discord Domain (discord .com in TLS SNI) |
— | — | Device Retrieving External IP Address Detected | ET INFO External IP Lookup ip-api.com |
— | — | Misc activity | ET INFO Discord Chat Service Domain in DNS Lookup (discord .com) |
— | — | Misc activity | ET INFO Observed Discord Service Domain (discord .com) in TLS SNI |
— | — | A Network Trojan was detected | STEALER [ANY.RUN] BlankGrabber (SkochGrabber) Generic External IP Check |