General

  • Target

    2024-12-23_9bbba13150339a2dd329ac1b83e4c6a9_bkransomware_hawkeye

  • Size

    524KB

  • Sample

    241223-y261bszngk

  • MD5

    9bbba13150339a2dd329ac1b83e4c6a9

  • SHA1

    404262cdd25935bb317674fe5c79c8f9aa89177f

  • SHA256

    14fcf377e0a70d4e5ff9e86a237012c6593c2dcf2d45ab74da4fca960fd6ad21

  • SHA512

    3ae8e4998371c45511ebe72191ad52fe9783f56954254571b8650b7d5007f234764b36147c52bce1a915d1fdf7643b1ee9e83385d39893358c36b5300ef96a59

  • SSDEEP

    6144:royZmTAsfJFakxaLjcMkc0Cax1PM1Gp6bYA0w601+dNT9/0626ASkVOAFMhVkdql:royIJsMPrPvp6bYboEdNPhOdV2OkMKBZ

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

http://klkjwre77638dfqwieuoi888.info/

Targets

    • Target

      2024-12-23_9bbba13150339a2dd329ac1b83e4c6a9_bkransomware_hawkeye

    • Size

      524KB

    • MD5

      9bbba13150339a2dd329ac1b83e4c6a9

    • SHA1

      404262cdd25935bb317674fe5c79c8f9aa89177f

    • SHA256

      14fcf377e0a70d4e5ff9e86a237012c6593c2dcf2d45ab74da4fca960fd6ad21

    • SHA512

      3ae8e4998371c45511ebe72191ad52fe9783f56954254571b8650b7d5007f234764b36147c52bce1a915d1fdf7643b1ee9e83385d39893358c36b5300ef96a59

    • SSDEEP

      6144:royZmTAsfJFakxaLjcMkc0Cax1PM1Gp6bYA0w601+dNT9/0626ASkVOAFMhVkdql:royIJsMPrPvp6bYboEdNPhOdV2OkMKBZ

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Windows security modification

    • Checks whether UAC is enabled

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks