General

  • Target

    803a9fdb26c22ecd599f25f30e79c4914c75e45c2613718c4a25b16112222726

  • Size

    206KB

  • Sample

    220520-1dsh5sdge4

  • MD5

    542751e8e64d10ff82ff68c514486246

  • SHA1

    e376fa75c0597a0b877fcd547355fd0e2ecffb19

  • SHA256

    803a9fdb26c22ecd599f25f30e79c4914c75e45c2613718c4a25b16112222726

  • SHA512

    2b9a16d54459c8c673791ba9d8f83fd1ea23a70deda0179dcccc5da688cdc5a69a25d9f8fede72b7f16f945970e0e739a69fbf1a7f09211fb1701200d226f063

Malware Config

Targets

    • Target

      803a9fdb26c22ecd599f25f30e79c4914c75e45c2613718c4a25b16112222726

    • Size

      206KB

    • MD5

      542751e8e64d10ff82ff68c514486246

    • SHA1

      e376fa75c0597a0b877fcd547355fd0e2ecffb19

    • SHA256

      803a9fdb26c22ecd599f25f30e79c4914c75e45c2613718c4a25b16112222726

    • SHA512

      2b9a16d54459c8c673791ba9d8f83fd1ea23a70deda0179dcccc5da688cdc5a69a25d9f8fede72b7f16f945970e0e739a69fbf1a7f09211fb1701200d226f063

    • Locky

      Ransomware strain released in 2016, with advanced features like anti-analysis.

    • Locky (Osiris variant)

      Variant of the Locky ransomware seen in the wild since early 2017.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Deletes itself

    • Adds Run key to start application

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v6

Tasks