General

  • Target

    10bed3e54c61088d5dc0d1be55da154efbcb32130ebf228e446fc97f5787e7a0

  • Size

    592KB

  • Sample

    220604-ng3gasdce7

  • MD5

    a85fa294fa2d4d48565cd78b4950695d

  • SHA1

    0db85dd510c03b3642bd7d1f214bade1a2574106

  • SHA256

    10bed3e54c61088d5dc0d1be55da154efbcb32130ebf228e446fc97f5787e7a0

  • SHA512

    b529c8203cc089a4d58d6095a2e1b6bd442f6c1c6ec070f95f80e5d55ea8a1621401c333e83bbc7090a1297113c1522045cbbd83d0ca0235f4520eb175d751de

Score
10/10

Malware Config

Targets

    • Target

      10bed3e54c61088d5dc0d1be55da154efbcb32130ebf228e446fc97f5787e7a0

    • Size

      592KB

    • MD5

      a85fa294fa2d4d48565cd78b4950695d

    • SHA1

      0db85dd510c03b3642bd7d1f214bade1a2574106

    • SHA256

      10bed3e54c61088d5dc0d1be55da154efbcb32130ebf228e446fc97f5787e7a0

    • SHA512

      b529c8203cc089a4d58d6095a2e1b6bd442f6c1c6ec070f95f80e5d55ea8a1621401c333e83bbc7090a1297113c1522045cbbd83d0ca0235f4520eb175d751de

    Score
    10/10
    • Locky

      Ransomware strain released in 2016, with advanced features like anti-analysis.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

MITRE ATT&CK Enterprise v6

Tasks