General
-
Target
117da274f4076bdd7f3aa6e6b1d96c44100ccaef59194202fc166ee5f4be78b2
-
Size
654KB
-
Sample
220604-d6fzgsgfa2
-
MD5
0b40a2fff66d3c7f728b2d0e9ae861a6
-
SHA1
91f89d87f92ba4f96d16a96c35e56e039adf6979
-
SHA256
117da274f4076bdd7f3aa6e6b1d96c44100ccaef59194202fc166ee5f4be78b2
-
SHA512
dec02943bb4dfae04c0fcce7cb644aa60277f33cd4747270b4a2d3feb5ca53cf6a5d037eb618bc4c27e3ea266089a2fa8b0ae1fb68f9180fb9b4a15522834c5a
Static task
static1
Behavioral task
behavioral1
Sample
117da274f4076bdd7f3aa6e6b1d96c44100ccaef59194202fc166ee5f4be78b2.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
117da274f4076bdd7f3aa6e6b1d96c44100ccaef59194202fc166ee5f4be78b2.exe
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
117da274f4076bdd7f3aa6e6b1d96c44100ccaef59194202fc166ee5f4be78b2
-
Size
654KB
-
MD5
0b40a2fff66d3c7f728b2d0e9ae861a6
-
SHA1
91f89d87f92ba4f96d16a96c35e56e039adf6979
-
SHA256
117da274f4076bdd7f3aa6e6b1d96c44100ccaef59194202fc166ee5f4be78b2
-
SHA512
dec02943bb4dfae04c0fcce7cb644aa60277f33cd4747270b4a2d3feb5ca53cf6a5d037eb618bc4c27e3ea266089a2fa8b0ae1fb68f9180fb9b4a15522834c5a
Score10/10-
Locky (Lukitus variant)
Variant of the Locky ransomware seen in the wild since late 2017.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Adds Run key to start application
-
Sets desktop wallpaper using registry
-