General

  • Target

    2024-11-21_57c5134d7434d8cde5d837dadf5e920c_bkransomware_hawkeye

  • Size

    524KB

  • Sample

    241121-wb4q6symep

  • MD5

    57c5134d7434d8cde5d837dadf5e920c

  • SHA1

    7465994486bfd3be6f36aeea4b707cae025727f4

  • SHA256

    5093b9d602afbf1b6783f445358dc0626477c617d135327fd1b6ede3105b2bc7

  • SHA512

    a98180a5fd0551926cc7e9497db3bcca05a7553b0d8ca588f7aff7b651414f565aa434d4fe95cdc010b2293624e9f73957a2affd9f5fd7c503a0efeacbace6c9

  • SSDEEP

    6144:/oyZmTAsfJFakxaLjcMkc0Cax1PJGp6bYA0w601+dNT9/0626ASkVOAFxLReQuBb:/oyIJsMPrPcp6bYboEdN2c+Mwga2

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      2024-11-21_57c5134d7434d8cde5d837dadf5e920c_bkransomware_hawkeye

    • Size

      524KB

    • MD5

      57c5134d7434d8cde5d837dadf5e920c

    • SHA1

      7465994486bfd3be6f36aeea4b707cae025727f4

    • SHA256

      5093b9d602afbf1b6783f445358dc0626477c617d135327fd1b6ede3105b2bc7

    • SHA512

      a98180a5fd0551926cc7e9497db3bcca05a7553b0d8ca588f7aff7b651414f565aa434d4fe95cdc010b2293624e9f73957a2affd9f5fd7c503a0efeacbace6c9

    • SSDEEP

      6144:/oyZmTAsfJFakxaLjcMkc0Cax1PJGp6bYA0w601+dNT9/0626ASkVOAFxLReQuBb:/oyIJsMPrPcp6bYboEdN2c+Mwga2

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Windows security modification

    • Checks whether UAC is enabled

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks