HellCat Ransomware Brief: A New Wave of Attacks in the RaaS Era

Summary

HellCat ransomware first appeared in 2024. It primarily spreads through spear-phishing email attachments and by exploiting vulnerabilities in applications such as Atlassian Jira and Palo Alto PAN-OS (e.g., CVE-2024-0012 and CVE-2024-9474). HellCat operates under a Ransomware-as-a-Service (RaaS) model, focusing on high-value targets and government entities. It provides affiliated actors with ransomware tools and infrastructure in exchange for a share of the profits.

Analysis

After execution, the ransomware displays a ransom note named “README.txt”. Victims are instructed to contact the attackers via an onion link or email. The note also includes an account and password.

Payload Details

The HellCat payload is a standard 64-bit PE file, approximately 18KB in size, capable of encrypting specific directories or the full disk.

Encryption Method

HellCat uses AES in CBC mode to encrypt files and secures the AES key with RSA encryption.

Self-Deletion Mechanism

Additionally, HellCat utilizes Windows commands for self-deletion. If the ransomware sample is still present, it repeatedly tries to delete itself. This command is written to a file and executed, and it opens the ransom note file “_README_.txt” during this process.

Indicators of Compromise (IOC)

SHA256 Hashes of HellCat Samples93aa8b0f950a7ea7f0cee2ba106efaacf673bb2b504ca0b9e87f9ea41acfb599
5b492a70c2bbded7286528316d402c89ae5514162d2988b17d6434ead5c8c274
Onion Link hellcakbszllztlyqbjzwcbdhfrodx55wq77kmftp4bhnhsnn5r3odad.onion
File Extensions Excluded from Encryption .dll
.sys
.exe
.drv
.com
.cat

Recommendations

  • Regular Patching
    Frequently check and update all software and operating systems—especially critical applications like Atlassian Jira and Palo Alto PAN-OS—to patch known vulnerabilities (e.g., CVE-2024-0012 and CVE-2024-9474).
  • Principle of Least Privilege
    Limit user access to systems and data based on their roles, ensuring that only authorized users can access sensitive information and critical systems.
  • Security Monitoring and Response
    Implement security event monitoring and incident response mechanisms to detect and respond to potential threats in a timely manner, minimizing the impact of attacks.