General

  • Target

    2deaa0ec7445c26f1442f860eb32f4fcda2d501699d09a94c26035d6185803ea.zip

  • Size

    528KB

  • Sample

    201105-9s79ajn4k6

  • MD5

    aac86ca1b4485af9e4d82559797a5cfd

  • SHA1

    1274037ed6bcfa845ddbae29ecaaca2df3c76150

  • SHA256

    5f5a2d6ac7de72eee55e169111e84c482cf7b700505d1608fcecb4c0b501e3ab

  • SHA512

    72a093adaa96a4a4d23cf707513ab5200413a0906e5a980f76486e93e2dae0ed399c0637d475fc0302a293deeff36db54c078b2181536d806ea643ab1cee412c

Malware Config

Targets

    • Target

      2deaa0ec7445c26f1442f860eb32f4fcda2d501699d09a94c26035d6185803ea

    • Size

      657KB

    • MD5

      8009e4433aad21916a7761d374ee2be9

    • SHA1

      e0538c4bb3d0310f827799c98707b681d1f91b45

    • SHA256

      2deaa0ec7445c26f1442f860eb32f4fcda2d501699d09a94c26035d6185803ea

    • SHA512

      404f98fb57d0842aa43d5a113a395ff1d5d963ae60bce81d4dc22f3f0b382a7ba06703b0d7404a240e5edf5f1f75f8bc9b980a966bd29b9e432cd09cb1507071

    • Locky (Lukitus variant)

      Variant of the Locky ransomware seen in the wild since late 2017.

    • Deletes itself

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Impact

Defacement

1
T1491

Tasks