General
-
Target
2024-12-03_f63cbffe3b598cdcdb705450a5b25ec2_hawkeye_hijackloader_jaff
-
Size
13.2MB
-
Sample
241203-tasams1rev
-
MD5
f63cbffe3b598cdcdb705450a5b25ec2
-
SHA1
da4d7448272bccd3f5475508cfaa02cece7ddd2a
-
SHA256
05437cb054d09a5b927c8ab699cf61ef90ef8e81395af8c74142184175e4a230
-
SHA512
2c93a079824eb8024a4d0c151e998954be55c1bc319f22119663cde8ca1a4fa0456ada9a4b684e4594eea7f74ddfb6fc283fe10efbc70180dbafcef70be19364
-
SSDEEP
98304:RF8QUitE4iLqaPWGnEvK7RkOEEo+A7mOk3oaCVA7m2St29Ejzh9oEcx/R2qVIK4n:RFQWEPnPBnEXPELR8N3MKFBIHuM/w
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-03_f63cbffe3b598cdcdb705450a5b25ec2_hawkeye_hijackloader_jaff.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-12-03_f63cbffe3b598cdcdb705450a5b25ec2_hawkeye_hijackloader_jaff.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2024-12-03_f63cbffe3b598cdcdb705450a5b25ec2_hawkeye_hijackloader_jaff
-
Size
13.2MB
-
MD5
f63cbffe3b598cdcdb705450a5b25ec2
-
SHA1
da4d7448272bccd3f5475508cfaa02cece7ddd2a
-
SHA256
05437cb054d09a5b927c8ab699cf61ef90ef8e81395af8c74142184175e4a230
-
SHA512
2c93a079824eb8024a4d0c151e998954be55c1bc319f22119663cde8ca1a4fa0456ada9a4b684e4594eea7f74ddfb6fc283fe10efbc70180dbafcef70be19364
-
SSDEEP
98304:RF8QUitE4iLqaPWGnEvK7RkOEEo+A7mOk3oaCVA7m2St29Ejzh9oEcx/R2qVIK4n:RFQWEPnPBnEXPELR8N3MKFBIHuM/w
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Renames multiple (182) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-