General
-
Target
2024-06-16_ee54eccafc55b6005ab5fb1cf6b289d8_bkransomware
-
Size
524KB
-
Sample
240616-y5pv8azelr
-
MD5
ee54eccafc55b6005ab5fb1cf6b289d8
-
SHA1
50190efbc99b3dcfc3ff6151e99ded381f67b810
-
SHA256
ca64b9081d4681dab680780f3526443679df4b810d071c551257999f7fa76b95
-
SHA512
c835ace6629dd1bf1298972f4948cfddbeb8c71f7bf1936ab16c40d1436de0e2bf6e0c0972a0d1a81b9a8d6f9a1fe025d2ff6e60b76c4fb67e11880940770842
-
SSDEEP
6144:royZmTAsfJFakxaLjcMkc0Cax1PjGp6bYA0w601+dNT9/0626ASkVOAFGCM/p74r:royIJsMPrPyp6bYboEdNNRSvdjFii
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-16_ee54eccafc55b6005ab5fb1cf6b289d8_bkransomware.exe
Resource
win7-20240611-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
http://klkjwre77638dfqwieuoi888.info/
Targets
-
-
Target
2024-06-16_ee54eccafc55b6005ab5fb1cf6b289d8_bkransomware
-
Size
524KB
-
MD5
ee54eccafc55b6005ab5fb1cf6b289d8
-
SHA1
50190efbc99b3dcfc3ff6151e99ded381f67b810
-
SHA256
ca64b9081d4681dab680780f3526443679df4b810d071c551257999f7fa76b95
-
SHA512
c835ace6629dd1bf1298972f4948cfddbeb8c71f7bf1936ab16c40d1436de0e2bf6e0c0972a0d1a81b9a8d6f9a1fe025d2ff6e60b76c4fb67e11880940770842
-
SSDEEP
6144:royZmTAsfJFakxaLjcMkc0Cax1PjGp6bYA0w601+dNT9/0626ASkVOAFGCM/p74r:royIJsMPrPyp6bYboEdNNRSvdjFii
-
Modifies firewall policy service
-
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality
-
UPX dump on OEP (original entry point)
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Executes dropped EXE
-
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1