General
-
Target
Hakuna Matata 2.3.exe
-
Size
357KB
-
Sample
241119-js983axkdk
-
MD5
9cb647e411fae3e3e22733ae173f001f
-
SHA1
e9c7fecfced3970cef907391445376a63145141e
-
SHA256
75d671aaef845011c6bb680b9ed4259b79711a57d6f35ded3577b321efa6cee4
-
SHA512
471f37d1a921f5c5bc9413f16817df87ae3eb8ca80ef24dc1152e16d1a24d28299f5c83cf9f1ecde0a2c23a56f18ed139283429360819a37bca58b7f7a98ecad
-
SSDEEP
3072:iveEBobbtsHkrXPF5mRPSW1NtdRG99992222J99992222pgGhg+HxVTijY29999C:iveEBobb3GKxHxVTL
Static task
static1
Behavioral task
behavioral1
Sample
Hakuna Matata 2.3.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
Hakuna Matata 2.3.exe
Resource
win11-20241007-en
Malware Config
Extracted
C:\Users\Admin\Documents\Readme.txt
Targets
-
-
Target
Hakuna Matata 2.3.exe
-
Size
357KB
-
MD5
9cb647e411fae3e3e22733ae173f001f
-
SHA1
e9c7fecfced3970cef907391445376a63145141e
-
SHA256
75d671aaef845011c6bb680b9ed4259b79711a57d6f35ded3577b321efa6cee4
-
SHA512
471f37d1a921f5c5bc9413f16817df87ae3eb8ca80ef24dc1152e16d1a24d28299f5c83cf9f1ecde0a2c23a56f18ed139283429360819a37bca58b7f7a98ecad
-
SSDEEP
3072:iveEBobbtsHkrXPF5mRPSW1NtdRG99992222J99992222pgGhg+HxVTijY29999C:iveEBobb3GKxHxVTL
Score10/10-
Renames multiple (106) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE
-
Adds Run key to start application
-
Sets desktop wallpaper using registry
-