HELLOKITTY
Description
(FireEye) HELLOKITTY ransomware—used to target Polish video game developer CD Projekt Red—is reportedly built from DEATHRANSOM. HELLOKITTY is named after a mutex named ‘HELLOKITTYMutex,’ used when the malware executable is launched
Names
Name |
---|
HELLOKITTY |
HelloKitty |
KittyCrypt |
Category
Malware
Type
- Ransomware
- Big Game Hunting
Information
- https://www.fireeye.com/blog/threat-research/2021/04/unc2447-sombrat-and-fivehands-ransomware-sophisticated-financial-threat.html
- https://www.bleepingcomputer.com/news/security/HELLOKITTY-ransomware-behind-cd-projekt-red-cyberattack-data-theft/
- https://www.bleepingcomputer.com/news/security/hellokitty-ransomware-is-targeting-vulnerable-sonicwall-devices/
- https://www.ic3.gov/Media/News/2021/211029.pdf
- https://www.bleepingcomputer.com/news/security/hellokitty-ransomware-source-code-leaked-on-hacking-forum/
- https://blog.barracuda.com/2024/04/24/hellokitty—hellogookie—hello—lockbit
Mitre Attack
Malpedia
- https://malpedia.caad.fkie.fraunhofer.de/details/win.hellokitty
- https://malpedia.caad.fkie.fraunhofer.de/details/elf.hellokitty
Playbook
Other Information
Uuid
fed08e25-fd63-4def-93d4-0fa8555fc680
Last Card Change
2024-06-18