General
-
Target
20161205_2e6c571558fdba57b85cb4db3b98a3c3.js
-
Size
13KB
-
Sample
211117-nyj2aacdf5
-
MD5
020a1da5932b76e2c7fa33346b582afc
-
SHA1
6ee6275161befa757ed5a107637a9242bfa35f22
-
SHA256
b8494b88e63351904e2e8cfb7f9f25ed4bd01a8e1b35cca65dff546dc5c01ccf
-
SHA512
ced1a86345ce46ed94d6a9a360bdaa73ed8759a8dc078a5bd55ee3e02b7cabcb4a0b2b7eb921c5939f0230f2e5300981c5700d307d9ae7a5a4202a2a00927c34
Static task
static1
Behavioral task
behavioral1
Sample
20161205_2e6c571558fdba57b85cb4db3b98a3c3.js
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
20161205_2e6c571558fdba57b85cb4db3b98a3c3.js
Resource
win10-en-20211014
Malware Config
Targets
-
-
Target
20161205_2e6c571558fdba57b85cb4db3b98a3c3.js
-
Size
13KB
-
MD5
020a1da5932b76e2c7fa33346b582afc
-
SHA1
6ee6275161befa757ed5a107637a9242bfa35f22
-
SHA256
b8494b88e63351904e2e8cfb7f9f25ed4bd01a8e1b35cca65dff546dc5c01ccf
-
SHA512
ced1a86345ce46ed94d6a9a360bdaa73ed8759a8dc078a5bd55ee3e02b7cabcb4a0b2b7eb921c5939f0230f2e5300981c5700d307d9ae7a5a4202a2a00927c34
Score10/10-
Locky (Osiris variant)
Variant of the Locky ransomware seen in the wild since early 2017.
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Sets desktop wallpaper using registry
-