General
-
Target
803a9fdb26c22ecd599f25f30e79c4914c75e45c2613718c4a25b16112222726
-
Size
206KB
-
Sample
220520-1dsh5sdge4
-
MD5
542751e8e64d10ff82ff68c514486246
-
SHA1
e376fa75c0597a0b877fcd547355fd0e2ecffb19
-
SHA256
803a9fdb26c22ecd599f25f30e79c4914c75e45c2613718c4a25b16112222726
-
SHA512
2b9a16d54459c8c673791ba9d8f83fd1ea23a70deda0179dcccc5da688cdc5a69a25d9f8fede72b7f16f945970e0e739a69fbf1a7f09211fb1701200d226f063
Static task
static1
Behavioral task
behavioral1
Sample
803a9fdb26c22ecd599f25f30e79c4914c75e45c2613718c4a25b16112222726.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
803a9fdb26c22ecd599f25f30e79c4914c75e45c2613718c4a25b16112222726.exe
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
803a9fdb26c22ecd599f25f30e79c4914c75e45c2613718c4a25b16112222726
-
Size
206KB
-
MD5
542751e8e64d10ff82ff68c514486246
-
SHA1
e376fa75c0597a0b877fcd547355fd0e2ecffb19
-
SHA256
803a9fdb26c22ecd599f25f30e79c4914c75e45c2613718c4a25b16112222726
-
SHA512
2b9a16d54459c8c673791ba9d8f83fd1ea23a70deda0179dcccc5da688cdc5a69a25d9f8fede72b7f16f945970e0e739a69fbf1a7f09211fb1701200d226f063
Score10/10-
Locky (Osiris variant)
Variant of the Locky ransomware seen in the wild since early 2017.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Deletes itself
-
Adds Run key to start application
-
Sets desktop wallpaper using registry
-