General
-
Target
2024-12-16_042ffef8ccf20f6ab7c94d704ad25725_bkransomware_floxif_karagany
-
Size
2.4MB
-
Sample
241216-md8cpsxlhm
-
MD5
042ffef8ccf20f6ab7c94d704ad25725
-
SHA1
4023bef967ab6e582d95cec7cac86ffeb68f5900
-
SHA256
a32ef8ac8833e9d0d1a87aa6250986ba02af089f0f394576027a44de8683e225
-
SHA512
11dfae4b75bad1fedc8aa37dbddf768ee935a20c1d603095e667760525c0b943df662c56aeb07522e3f697c3cf9b26a072bcae86a2bcd32871b5d1dfc861efc5
-
SSDEEP
6144:0BbDJvVo23+FM2+zIv+qgmeeyeDMzJYTxJxBV+UdvrEFp7hK7c:aDJvVXt4lDaNYTJBjvrEH7+c
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-16_042ffef8ccf20f6ab7c94d704ad25725_bkransomware_floxif_karagany.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
2024-12-16_042ffef8ccf20f6ab7c94d704ad25725_bkransomware_floxif_karagany
-
Size
2.4MB
-
MD5
042ffef8ccf20f6ab7c94d704ad25725
-
SHA1
4023bef967ab6e582d95cec7cac86ffeb68f5900
-
SHA256
a32ef8ac8833e9d0d1a87aa6250986ba02af089f0f394576027a44de8683e225
-
SHA512
11dfae4b75bad1fedc8aa37dbddf768ee935a20c1d603095e667760525c0b943df662c56aeb07522e3f697c3cf9b26a072bcae86a2bcd32871b5d1dfc861efc5
-
SSDEEP
6144:0BbDJvVo23+FM2+zIv+qgmeeyeDMzJYTxJxBV+UdvrEFp7hK7c:aDJvVXt4lDaNYTJBjvrEH7+c
-
Modifies firewall policy service
-
Sality family
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5