General

  • Target

    2024-12-16_289945f356f0080ec83aa02dafed055f_bkransomware_hawkeye

  • Size

    524KB

  • Sample

    241216-yz43ysyrhv

  • MD5

    289945f356f0080ec83aa02dafed055f

  • SHA1

    11e60be65f5bcd1c48b693e9c64058083e0e0690

  • SHA256

    ae544d23c54f4636436e89461c916bd5de38fbf57c41933b147284b4a0c077f2

  • SHA512

    e7e09b5b30d17b24d64f8ba2322cd118e0eba841ef115207313bd6494bbb0c5c461487495e384ea281c85d52f6d121a2f2ff6a6e2a2e76fb67d43d10059eaf0b

  • SSDEEP

    6144:YoyZmTAsfJFakxaLjcMkc0Cax1PnGp6bYA0w601+dNT9/0626ASkVOAFLr3iS20H:YoyIJsMPrPGp6bYboEdNUr3Zdnx0+f

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      2024-12-16_289945f356f0080ec83aa02dafed055f_bkransomware_hawkeye

    • Size

      524KB

    • MD5

      289945f356f0080ec83aa02dafed055f

    • SHA1

      11e60be65f5bcd1c48b693e9c64058083e0e0690

    • SHA256

      ae544d23c54f4636436e89461c916bd5de38fbf57c41933b147284b4a0c077f2

    • SHA512

      e7e09b5b30d17b24d64f8ba2322cd118e0eba841ef115207313bd6494bbb0c5c461487495e384ea281c85d52f6d121a2f2ff6a6e2a2e76fb67d43d10059eaf0b

    • SSDEEP

      6144:YoyZmTAsfJFakxaLjcMkc0Cax1PnGp6bYA0w601+dNT9/0626ASkVOAFLr3iS20H:YoyIJsMPrPGp6bYboEdNUr3Zdnx0+f

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks