General

  • Target

    20161205_d0a20f3ad3b7a2c399a9f9c8245dd76f.js

  • Size

    13KB

  • Sample

    211118-rcp7ysgee4

  • MD5

    f6dbcc215aaca6a41234b8f5c4e63102

  • SHA1

    ba8aaa58fa4e526cb0b6ef75948c5f5c22345d3d

  • SHA256

    a92fabe3ad5c2e51fe204e977772c935e3caeab6eb1c779a9258c7758eaff0c6

  • SHA512

    46bd8ec361b7cd22b311b7c4413ec1146d6b5c7ab7c6d99792423d27bb1748c0c61e6dd3c6d856af96b3fbb53d7a2e5b0797b17cfe36c356c12bc81dd5605397

Malware Config

Targets

    • Target

      20161205_d0a20f3ad3b7a2c399a9f9c8245dd76f.js

    • Size

      13KB

    • MD5

      f6dbcc215aaca6a41234b8f5c4e63102

    • SHA1

      ba8aaa58fa4e526cb0b6ef75948c5f5c22345d3d

    • SHA256

      a92fabe3ad5c2e51fe204e977772c935e3caeab6eb1c779a9258c7758eaff0c6

    • SHA512

      46bd8ec361b7cd22b311b7c4413ec1146d6b5c7ab7c6d99792423d27bb1748c0c61e6dd3c6d856af96b3fbb53d7a2e5b0797b17cfe36c356c12bc81dd5605397

    • Locky

      Ransomware strain released in 2016, with advanced features like anti-analysis.

    • Locky (Osiris variant)

      Variant of the Locky ransomware seen in the wild since early 2017.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Impact

Defacement

1
T1491

Tasks