General

  • Target

    svchost.zip

  • Size

    50KB

  • Sample

    220526-ew2c4scbdm

  • MD5

    63c438b82817117b49ab17bbf440e4df

  • SHA1

    415e5d0b0c8ce2dd0b0314b036932c8dd5735e03

  • SHA256

    3f6816cc5a084b59bd20c8f430202c463c6bb51257a7923f2313cb24be9f56dd

  • SHA512

    a3b1718c130cf21bd8068063156d3cfb21cfb1125717127cd2b074e40929e580da390dbad26ec90eb4ab28e7534a474d83cbd4dc2d2db5ab926071d990e48eeb

Malware Config

Targets

    • Target

      svchost.exe

    • Size

      102KB

    • MD5

      c63a537090d34f29daadbef221637435

    • SHA1

      ba17638bac43e6e3b2faf4bf3a22197b99d8a390

    • SHA256

      28046c14ea3325885ee1e731cd0bcf9f38445df02675836b851cb2ae94c050eb

    • SHA512

      d222c1f42475a242f1c9a379f9d828a8f8977648d618a0201fb7232a43759f5d7958e311396d41ea7d8b363588b19ac5e137c88160979d7e5dfc3b42d328e95d

    • Locky

      Ransomware strain released in 2016, with advanced features like anti-analysis.

    • suricata: ET MALWARE Ransomware Locky CnC Beacon

      suricata: ET MALWARE Ransomware Locky CnC Beacon

MITRE ATT&CK Matrix

Tasks