General
-
Target
12baa6c83e6f8b059e7f14cb67bdad4e917b90bc8a139b5379a4b42a0c92a6be
-
Size
2.7MB
-
Sample
250122-lmelbazrfn
-
MD5
feb8f145c403b56d85ef7c662f169428
-
SHA1
45fbb554666bffa433eed118cd6fcbd069b3fa25
-
SHA256
12baa6c83e6f8b059e7f14cb67bdad4e917b90bc8a139b5379a4b42a0c92a6be
-
SHA512
a69260bc132bc17607e48cafcd8278484e0ea4a7ad8d11559560b4589f4016aeae8dce89451735494860f4085098e20de400e4bfd189e7a6f7a61981299bc281
-
SSDEEP
49152:w+bUJqQ5lrb/T1vO90dL3BmAFd4A64nsfJj3y8pYeTmGS1NDDCqYzPr8bg11Vgjg:nbs5O3y8BTlz0i4JxOww
Static task
static1
Behavioral task
behavioral1
Sample
12baa6c83e6f8b059e7f14cb67bdad4e917b90bc8a139b5379a4b42a0c92a6be.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
12baa6c83e6f8b059e7f14cb67bdad4e917b90bc8a139b5379a4b42a0c92a6be.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Program Files\BKFP_HOW_TO_DECRYPT.txt
hive
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
Targets
-
-
Target
12baa6c83e6f8b059e7f14cb67bdad4e917b90bc8a139b5379a4b42a0c92a6be
-
Size
2.7MB
-
MD5
feb8f145c403b56d85ef7c662f169428
-
SHA1
45fbb554666bffa433eed118cd6fcbd069b3fa25
-
SHA256
12baa6c83e6f8b059e7f14cb67bdad4e917b90bc8a139b5379a4b42a0c92a6be
-
SHA512
a69260bc132bc17607e48cafcd8278484e0ea4a7ad8d11559560b4589f4016aeae8dce89451735494860f4085098e20de400e4bfd189e7a6f7a61981299bc281
-
SSDEEP
49152:w+bUJqQ5lrb/T1vO90dL3BmAFd4A64nsfJj3y8pYeTmGS1NDDCqYzPr8bg11Vgjg:nbs5O3y8BTlz0i4JxOww
-
Deletes Windows Defender Definitions
Uses mpcmdrun utility to delete all AV definitions.
-
Disables service(s)
-
Hive family
-
Modifies Windows Defender Real-time Protection settings
-
Modifies security service
-
Clears Windows event logs
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1System Services
1Service Execution
1Windows Management Instrumentation
1Defense Evasion
Direct Volume Access
1Impair Defenses
4Disable or Modify Tools
2Indicator Removal
3Clear Windows Event Logs
1File Deletion
2Modify Registry
4