General

  • Target

    2024-11-29_947c1c8939c8f393224328d2e1d25947_hawkeye_hijackloader_jaff

  • Size

    13.1MB

  • Sample

    241129-w9r52a1jfv

  • MD5

    947c1c8939c8f393224328d2e1d25947

  • SHA1

    338ecfda564a8fc588f5bd1d71d66390500d25d0

  • SHA256

    2427944ef51d4c628073b5db91d897ef4e42595603784a600e95041afb11582a

  • SHA512

    b2b004de725fd60825d2ce995fed9499e4b118830f8daca8cf1bc266fd4517b3d5cbf44b884e2c8647f56a687d62f1c981262d088b1075b591ac6b530825b267

  • SSDEEP

    98304:RF8QUitE4iLqaPWGnEvK7RkOEEo+A7mOk3oaCVA7m2St29Ejzh9oEcx/R2qVIK4t:RFQWEPnPBnEXPELR8N3MKFBIHuM/s

Malware Config

Targets

    • Target

      2024-11-29_947c1c8939c8f393224328d2e1d25947_hawkeye_hijackloader_jaff

    • Size

      13.1MB

    • MD5

      947c1c8939c8f393224328d2e1d25947

    • SHA1

      338ecfda564a8fc588f5bd1d71d66390500d25d0

    • SHA256

      2427944ef51d4c628073b5db91d897ef4e42595603784a600e95041afb11582a

    • SHA512

      b2b004de725fd60825d2ce995fed9499e4b118830f8daca8cf1bc266fd4517b3d5cbf44b884e2c8647f56a687d62f1c981262d088b1075b591ac6b530825b267

    • SSDEEP

      98304:RF8QUitE4iLqaPWGnEvK7RkOEEo+A7mOk3oaCVA7m2St29Ejzh9oEcx/R2qVIK4t:RFQWEPnPBnEXPELR8N3MKFBIHuM/s

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Banload family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Renames multiple (176) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks