Overview
overview
10Static
static
10Log4J Malw...26f.7z
windows7_x64
3Log4J Malw...26f.7z
windows10-2004_x64
390ee1a8e8f...c7d26f
linux_amd64
6e25ad0310...8b.elf
linux_amd64
7e9663f872...512.sh
linux_amd64
7e9663f872...512.sh
linux_armhf
7e9663f872...512.sh
linux_mips
7e9663f872...512.sh
linux_mipsel
10fad59b07...2b4513
linux_amd64
10fad59b07...2b4513
linux_armhf
10fad59b07...2b4513
linux_mips
10fad59b07...2b4513
linux_mipsel
3f6120ca0f...d26.sh
windows7_x64
33f6120ca0f...d26.sh
windows10-2004_x64
3776c341504...abcc00
linux_amd64
15e7942ebf...79b36b
linux_mips
e7c5b3de93...cc0e82
linux_amd64
Analysis
-
max time kernel
109s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
13/05/2022, 16:13
Static task
static1
Behavioral task
behavioral1
Sample
Log4J Malware/Elknot/90ee1a8e8f0ea5085b83b8efe174674a93260b599729bf53e1b140e2acc7d26f.7z
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Log4J Malware/Elknot/90ee1a8e8f0ea5085b83b8efe174674a93260b599729bf53e1b140e2acc7d26f.7z
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
90ee1a8e8f0ea5085b83b8efe174674a93260b599729bf53e1b140e2acc7d26f
Resource
ubuntu1804-amd64-en-20211208
Behavioral task
behavioral4
Sample
6e25ad03103a1a972b78c642bac09060fa79c460011dc5748cbb433cc459938b.elf
Resource
ubuntu1804-amd64-en-20211208
Behavioral task
behavioral5
Sample
7e9663f87255ae2ff78eb882efe8736431368f341849fec000543f027bdb4512.sh
Resource
ubuntu1804-amd64-en-20211208
Behavioral task
behavioral6
Sample
7e9663f87255ae2ff78eb882efe8736431368f341849fec000543f027bdb4512.sh
Resource
debian9-armhf-en-20211208
Behavioral task
behavioral7
Sample
7e9663f87255ae2ff78eb882efe8736431368f341849fec000543f027bdb4512.sh
Resource
debian9-mipsbe-en-20211208
Behavioral task
behavioral8
Sample
7e9663f87255ae2ff78eb882efe8736431368f341849fec000543f027bdb4512.sh
Resource
debian9-mipsel-en-20211208
Behavioral task
behavioral9
Sample
10fad59b071db09aafcb7f40e775f28180aed182786557e9ee7f2f2e332b4513
Resource
ubuntu1804-amd64-en-20211208
Behavioral task
behavioral10
Sample
10fad59b071db09aafcb7f40e775f28180aed182786557e9ee7f2f2e332b4513
Resource
debian9-armhf-en-20211208
Behavioral task
behavioral11
Sample
10fad59b071db09aafcb7f40e775f28180aed182786557e9ee7f2f2e332b4513
Resource
debian9-mipsbe-en-20211208
Behavioral task
behavioral12
Sample
10fad59b071db09aafcb7f40e775f28180aed182786557e9ee7f2f2e332b4513
Resource
debian9-mipsel-en-20211208
Behavioral task
behavioral13
Sample
3f6120ca0ff7cf6389ce392d4018a5e40b131a083b071187bf54c900e2edad26.sh
Resource
win7-20220414-en
Behavioral task
behavioral14
Sample
3f6120ca0ff7cf6389ce392d4018a5e40b131a083b071187bf54c900e2edad26.sh
Resource
win10v2004-20220414-en
Behavioral task
behavioral15
Sample
776c341504769aa67af7efc5acc66c338dab5684a8579134d3f23165c7abcc00
Resource
ubuntu1804-amd64-en-20211208
Behavioral task
behavioral16
Sample
15e7942ebf88a51346d3a5975bb1c2d87996799e6255db9e92aed798d279b36b
Resource
debian9-mipsbe-en-20211208
Behavioral task
behavioral17
Sample
e7c5b3de93a3184dc99c98c7f45e6ff5f6881b15d4a56c144e2e53e96dcc0e82
Resource
ubuntu1804-amd64-en-20211208
General
-
Target
Log4J Malware/Elknot/90ee1a8e8f0ea5085b83b8efe174674a93260b599729bf53e1b140e2acc7d26f.7z
-
Size
362KB
-
MD5
86a016b9b15f8b409b1b022069c1eb42
-
SHA1
fbed2f40fac21a2ef654026e37eafb82fb9f4ca5
-
SHA256
f43aa2f2aad2308deeb2d2f5f01280f1a544412d8805422a7714d9bf758c4fe1
-
SHA512
49d7c6b2b64903b149c0337a7ee7463a6e6fa8abcf3a6d2c7456f854b5f8b53535280d936a2499d803e1258b25994ed805ae90f197ba18ad81301627c7c26430
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2328 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Log4J Malware\Elknot\90ee1a8e8f0ea5085b83b8efe174674a93260b599729bf53e1b140e2acc7d26f.7z"1⤵
- Modifies registry class
PID:5104
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2328