General

  • Target

    e5bafdd9d27defccb5c62db15a0374ccdeedb6a279b33776e8fc1ecb728d70e4

  • Size

    595KB

  • Sample

    220305-13ryxabbbl

  • MD5

    1c1a6b70b5e2b13c019d5cbdf0f12738

  • SHA1

    d21b9d5ca7327bb1ca57aaf8752e7764a3334fe8

  • SHA256

    e5bafdd9d27defccb5c62db15a0374ccdeedb6a279b33776e8fc1ecb728d70e4

  • SHA512

    f6c37079d3f7ae55cfdb1e588830d30bad4b820afc7765c20081a501fe916c6b1b8aa78090801ecb7f3776ae8766987220af5a4eb2639b7d87f56721be7bc675

Malware Config

Targets

    • Target

      e5bafdd9d27defccb5c62db15a0374ccdeedb6a279b33776e8fc1ecb728d70e4

    • Size

      595KB

    • MD5

      1c1a6b70b5e2b13c019d5cbdf0f12738

    • SHA1

      d21b9d5ca7327bb1ca57aaf8752e7764a3334fe8

    • SHA256

      e5bafdd9d27defccb5c62db15a0374ccdeedb6a279b33776e8fc1ecb728d70e4

    • SHA512

      f6c37079d3f7ae55cfdb1e588830d30bad4b820afc7765c20081a501fe916c6b1b8aa78090801ecb7f3776ae8766987220af5a4eb2639b7d87f56721be7bc675

    • Locky

      Ransomware strain released in 2016, with advanced features like anti-analysis.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Deletes itself

    • Adds Run key to start application

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v6

Tasks