General
-
Target
2024-09-09_a3dc8739c25b9b0c0348fc12fddcef65_cobalt-strike_hellokitty
-
Size
473KB
-
Sample
240909-q3znmstdjc
-
MD5
a3dc8739c25b9b0c0348fc12fddcef65
-
SHA1
37fa81ea2346e2110715c604d451097b95bb4698
-
SHA256
4b082cfa36133e66c3ed8918ed775bd656890c3c7373606d67e0ee9edd6aa3b4
-
SHA512
e75715dbfd4ad26cf0ed0666c3f293963eafdcd94847346e5a3104b53018155d41cca9220147e5f23621abb9955d496c5aa83edad572b56bc9e3d401cfe6323f
-
SSDEEP
3072:WLObLmjqGR2l/mlHaMwGkHJhqDLcClct:WLkLmjqGk/m2ghlC
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-09_a3dc8739c25b9b0c0348fc12fddcef65_cobalt-strike_hellokitty.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-09_a3dc8739c25b9b0c0348fc12fddcef65_cobalt-strike_hellokitty.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\Recovery\20e7eb62-69f6-11ef-be0c-62cb582c238c\read_me_lkdtt.txt
http://x6gjpqs4jjvgpfvhghdz2dk7be34emyzluimticj5s5fexf4wa65ngad.onion/0c04b15081595448821e25e8dd07423d9927fa54cd56d8797ea4d1315a682692
Targets
-
-
Target
2024-09-09_a3dc8739c25b9b0c0348fc12fddcef65_cobalt-strike_hellokitty
-
Size
473KB
-
MD5
a3dc8739c25b9b0c0348fc12fddcef65
-
SHA1
37fa81ea2346e2110715c604d451097b95bb4698
-
SHA256
4b082cfa36133e66c3ed8918ed775bd656890c3c7373606d67e0ee9edd6aa3b4
-
SHA512
e75715dbfd4ad26cf0ed0666c3f293963eafdcd94847346e5a3104b53018155d41cca9220147e5f23621abb9955d496c5aa83edad572b56bc9e3d401cfe6323f
-
SSDEEP
3072:WLObLmjqGR2l/mlHaMwGkHJhqDLcClct:WLkLmjqGk/m2ghlC
Score10/10-
HelloKitty Ransomware
Ransomware family which has been active since late 2020, and in early 2021 a variant compromised the CDProjektRed game studio.
-
Renames multiple (188) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-