General

  • Target

    1649336db033457cb387daba9e83f36b35c8487f1d5dc95356b8a87bad63a749

  • Size

    438KB

  • Sample

    220609-a8qpxsdhd6

  • MD5

    150eb0b98235ca55a041ea93995bc3ef

  • SHA1

    b5ba2c578306e6aeca30892e473ab6a712bfa487

  • SHA256

    1649336db033457cb387daba9e83f36b35c8487f1d5dc95356b8a87bad63a749

  • SHA512

    6ee5cbf14ce4239bbb6626e4b703cc9895c7ca34ba9bab8b2658fe92b1a9847855e0b3dedb657302d5f2e9d8e03e2f62a2a4dd9444f69f1718bd615ea3de8e31

Malware Config

Targets

    • Target

      1649336db033457cb387daba9e83f36b35c8487f1d5dc95356b8a87bad63a749

    • Size

      438KB

    • MD5

      150eb0b98235ca55a041ea93995bc3ef

    • SHA1

      b5ba2c578306e6aeca30892e473ab6a712bfa487

    • SHA256

      1649336db033457cb387daba9e83f36b35c8487f1d5dc95356b8a87bad63a749

    • SHA512

      6ee5cbf14ce4239bbb6626e4b703cc9895c7ca34ba9bab8b2658fe92b1a9847855e0b3dedb657302d5f2e9d8e03e2f62a2a4dd9444f69f1718bd615ea3de8e31

    • Locky

      Ransomware strain released in 2016, with advanced features like anti-analysis.

    • Locky (Osiris variant)

      Variant of the Locky ransomware seen in the wild since early 2017.

    • suricata: ET MALWARE Locky CnC Checkin Dec 5 M1

      suricata: ET MALWARE Locky CnC Checkin Dec 5 M1

    • suricata: ET MALWARE Locky CnC Checkin HTTP Pattern

      suricata: ET MALWARE Locky CnC Checkin HTTP Pattern

MITRE ATT&CK Matrix

Tasks