General

  • Target

    2024-12-03_f63cbffe3b598cdcdb705450a5b25ec2_hawkeye_hijackloader_jaff

  • Size

    13.2MB

  • Sample

    241203-tasams1rev

  • MD5

    f63cbffe3b598cdcdb705450a5b25ec2

  • SHA1

    da4d7448272bccd3f5475508cfaa02cece7ddd2a

  • SHA256

    05437cb054d09a5b927c8ab699cf61ef90ef8e81395af8c74142184175e4a230

  • SHA512

    2c93a079824eb8024a4d0c151e998954be55c1bc319f22119663cde8ca1a4fa0456ada9a4b684e4594eea7f74ddfb6fc283fe10efbc70180dbafcef70be19364

  • SSDEEP

    98304:RF8QUitE4iLqaPWGnEvK7RkOEEo+A7mOk3oaCVA7m2St29Ejzh9oEcx/R2qVIK4n:RFQWEPnPBnEXPELR8N3MKFBIHuM/w

Malware Config

Targets

    • Target

      2024-12-03_f63cbffe3b598cdcdb705450a5b25ec2_hawkeye_hijackloader_jaff

    • Size

      13.2MB

    • MD5

      f63cbffe3b598cdcdb705450a5b25ec2

    • SHA1

      da4d7448272bccd3f5475508cfaa02cece7ddd2a

    • SHA256

      05437cb054d09a5b927c8ab699cf61ef90ef8e81395af8c74142184175e4a230

    • SHA512

      2c93a079824eb8024a4d0c151e998954be55c1bc319f22119663cde8ca1a4fa0456ada9a4b684e4594eea7f74ddfb6fc283fe10efbc70180dbafcef70be19364

    • SSDEEP

      98304:RF8QUitE4iLqaPWGnEvK7RkOEEo+A7mOk3oaCVA7m2St29Ejzh9oEcx/R2qVIK4n:RFQWEPnPBnEXPELR8N3MKFBIHuM/w

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Banload family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Renames multiple (182) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks