General
-
Target
JJSploit_8.11.0_x64_en-US.msi
-
Size
5.1MB
-
Sample
250124-cg8grstqfz
-
MD5
fe0b64b5c6ffe422676ae7216c2d38c9
-
SHA1
51350ac5ce079cbe741bd48d6462075b7c23adef
-
SHA256
f95043eed6a9f827ebd2e46493343a8f734378ecd6022975455ae01334c52749
-
SHA512
055ddc9f124ae2cab6ff2d1e1a6f927b088417beb1e813e09a791289ea1e5666c258d48d1ae7aa12ac5c7932cfed888524c89c1b2d01dfe7bee00cba5f6b5b56
-
SSDEEP
98304:ST4zeG7P2hdWkNAQGmtuNQmPan/7BYUlZ9dso1Y8Vk18urY46wGIrSv8m:ST4qG7P2hd7/IQNpdsojY8ur2Ir
Static task
static1
Behavioral task
behavioral1
Sample
JJSploit_8.11.0_x64_en-US.msi
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
JJSploit_8.11.0_x64_en-US.msi
-
Size
5.1MB
-
MD5
fe0b64b5c6ffe422676ae7216c2d38c9
-
SHA1
51350ac5ce079cbe741bd48d6462075b7c23adef
-
SHA256
f95043eed6a9f827ebd2e46493343a8f734378ecd6022975455ae01334c52749
-
SHA512
055ddc9f124ae2cab6ff2d1e1a6f927b088417beb1e813e09a791289ea1e5666c258d48d1ae7aa12ac5c7932cfed888524c89c1b2d01dfe7bee00cba5f6b5b56
-
SSDEEP
98304:ST4zeG7P2hdWkNAQGmtuNQmPan/7BYUlZ9dso1Y8Vk18urY46wGIrSv8m:ST4qG7P2hd7/IQNpdsojY8ur2Ir
-
BadRabbit
Ransomware family discovered in late 2017, mainly targeting Russia and Ukraine.
-
Badrabbit family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Installer Packages
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Event Triggered Execution
1Installer Packages
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Subvert Trust Controls
1SIP and Trust Provider Hijacking
1System Binary Proxy Execution
1Msiexec
1