General

  • Target

    SecuriteInfo.com.FileCryptor.PSW.3725.32198

  • Size

    621KB

  • Sample

    201109-ygyawtat2a

  • MD5

    35ac4323f2ba28cc314cc9cd8be87326

  • SHA1

    23177683c38774505bbfaaeba9060659d1086d85

  • SHA256

    da0c0089713cfd5b47f425f23c23f9a9d82e62000873747dce1a73220319f93e

  • SHA512

    a0e8acd3850bbae521130dd4bc67692a4fc9b5c2a7d33c4d31666c99347603a301cd24f63c1fa5e4ac63f8e1bda6dbdf048f248ab96f2a7d1d899372846ca8e4

Malware Config

Targets

    • Target

      SecuriteInfo.com.FileCryptor.PSW.3725.32198

    • Size

      621KB

    • MD5

      35ac4323f2ba28cc314cc9cd8be87326

    • SHA1

      23177683c38774505bbfaaeba9060659d1086d85

    • SHA256

      da0c0089713cfd5b47f425f23c23f9a9d82e62000873747dce1a73220319f93e

    • SHA512

      a0e8acd3850bbae521130dd4bc67692a4fc9b5c2a7d33c4d31666c99347603a301cd24f63c1fa5e4ac63f8e1bda6dbdf048f248ab96f2a7d1d899372846ca8e4

    • Locky

      Ransomware strain released in 2016, with advanced features like anti-analysis.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Modifies service

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Defense Evasion

File Deletion

2
T1107

Modify Registry

3
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Impact

Inhibit System Recovery

2
T1490

Defacement

1
T1491

Tasks