General

  • Target

    20161205_bc36f1ce16f62adcd3368593f2c4ece0.js

  • Size

    12KB

  • Sample

    211118-rcpw7aged6

  • MD5

    ec1eaa7630980202c2ea84f4f99d8f14

  • SHA1

    7458ab3e869639e7e4fa55dd98994961ebd94f66

  • SHA256

    d3f7159425c0e6b1c076d12eacb62345188cd9fbc7fb74052a5b3b220df91e2f

  • SHA512

    9ff4b87c973694ae2ddf8102b06d9de2dc1758d71e70239cd2ade1e83352f1e324d225bd6a63d2045631f52e34c96c774af24fb8fdaa7e35598349f99cf92d9f

Malware Config

Targets

    • Target

      20161205_bc36f1ce16f62adcd3368593f2c4ece0.js

    • Size

      12KB

    • MD5

      ec1eaa7630980202c2ea84f4f99d8f14

    • SHA1

      7458ab3e869639e7e4fa55dd98994961ebd94f66

    • SHA256

      d3f7159425c0e6b1c076d12eacb62345188cd9fbc7fb74052a5b3b220df91e2f

    • SHA512

      9ff4b87c973694ae2ddf8102b06d9de2dc1758d71e70239cd2ade1e83352f1e324d225bd6a63d2045631f52e34c96c774af24fb8fdaa7e35598349f99cf92d9f

    • Locky

      Ransomware strain released in 2016, with advanced features like anti-analysis.

    • Locky (Osiris variant)

      Variant of the Locky ransomware seen in the wild since early 2017.

    • Blocklisted process makes network request

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Loads dropped DLL

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Impact

Defacement

1
T1491

Tasks