General
-
Target
20161205_d0a20f3ad3b7a2c399a9f9c8245dd76f.js
-
Size
13KB
-
Sample
211118-rcp7ysgee4
-
MD5
f6dbcc215aaca6a41234b8f5c4e63102
-
SHA1
ba8aaa58fa4e526cb0b6ef75948c5f5c22345d3d
-
SHA256
a92fabe3ad5c2e51fe204e977772c935e3caeab6eb1c779a9258c7758eaff0c6
-
SHA512
46bd8ec361b7cd22b311b7c4413ec1146d6b5c7ab7c6d99792423d27bb1748c0c61e6dd3c6d856af96b3fbb53d7a2e5b0797b17cfe36c356c12bc81dd5605397
Static task
static1
Behavioral task
behavioral1
Sample
20161205_d0a20f3ad3b7a2c399a9f9c8245dd76f.js
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
20161205_d0a20f3ad3b7a2c399a9f9c8245dd76f.js
Resource
win10-en-20211104
Malware Config
Targets
-
-
Target
20161205_d0a20f3ad3b7a2c399a9f9c8245dd76f.js
-
Size
13KB
-
MD5
f6dbcc215aaca6a41234b8f5c4e63102
-
SHA1
ba8aaa58fa4e526cb0b6ef75948c5f5c22345d3d
-
SHA256
a92fabe3ad5c2e51fe204e977772c935e3caeab6eb1c779a9258c7758eaff0c6
-
SHA512
46bd8ec361b7cd22b311b7c4413ec1146d6b5c7ab7c6d99792423d27bb1748c0c61e6dd3c6d856af96b3fbb53d7a2e5b0797b17cfe36c356c12bc81dd5605397
Score10/10-
Locky (Osiris variant)
Variant of the Locky ransomware seen in the wild since early 2017.
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Sets desktop wallpaper using registry
-