General

  • Target

    1c0b42adec440aa0bf93afaf3b4bc1db298582a0b645fc7d383914aa9fe3f4d6

  • Size

    184KB

  • Sample

    220607-t9wgcaghhj

  • MD5

    6bf3cc80a4a40f403d0d6d341d3b06b9

  • SHA1

    c7ab9915a7e5b4a1396fc57262e91b2a38612eee

  • SHA256

    1c0b42adec440aa0bf93afaf3b4bc1db298582a0b645fc7d383914aa9fe3f4d6

  • SHA512

    b3e0baff8d994a23539c1b1ae909b5440d224ac65cd0034306c8f448f574d0a99e2d3ee1c8e67c66bf97172fe55bacf3674d6163d31f5b01c034bb955a161fec

Malware Config

Targets

    • Target

      1c0b42adec440aa0bf93afaf3b4bc1db298582a0b645fc7d383914aa9fe3f4d6

    • Size

      184KB

    • MD5

      6bf3cc80a4a40f403d0d6d341d3b06b9

    • SHA1

      c7ab9915a7e5b4a1396fc57262e91b2a38612eee

    • SHA256

      1c0b42adec440aa0bf93afaf3b4bc1db298582a0b645fc7d383914aa9fe3f4d6

    • SHA512

      b3e0baff8d994a23539c1b1ae909b5440d224ac65cd0034306c8f448f574d0a99e2d3ee1c8e67c66bf97172fe55bacf3674d6163d31f5b01c034bb955a161fec

    • Locky

      Ransomware strain released in 2016, with advanced features like anti-analysis.

    • suricata: ET MALWARE Locky CnC Checkin HTTP Pattern

      suricata: ET MALWARE Locky CnC Checkin HTTP Pattern

    • suricata: ET MALWARE Locky CnC checkin Nov 21

      suricata: ET MALWARE Locky CnC checkin Nov 21

    • suricata: ET MALWARE Locky CnC checkin Nov 21 M2

      suricata: ET MALWARE Locky CnC checkin Nov 21 M2

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks