General

  • Target

    1faf6ee59f9fa7879adbcb03a7f86dde4647822cfb51124bba01788bc9bbb028

  • Size

    212KB

  • Sample

    220612-vm1cfsggcj

  • MD5

    a2e8be98b5c3e36df4d999f98106aa3b

  • SHA1

    ade730fc636fa0140400e03df4ad486fca5ebf19

  • SHA256

    1faf6ee59f9fa7879adbcb03a7f86dde4647822cfb51124bba01788bc9bbb028

  • SHA512

    0d370ef5cdb1dd9f141a705a90f8bb9b7e610749ebebfb387bb191e65fa85259524c8cdbf78a91104a35a07f7804a359cd985674eca5c01bec5fda4f56cb5b00

Score
10/10

Malware Config

Targets

    • Target

      1faf6ee59f9fa7879adbcb03a7f86dde4647822cfb51124bba01788bc9bbb028

    • Size

      212KB

    • MD5

      a2e8be98b5c3e36df4d999f98106aa3b

    • SHA1

      ade730fc636fa0140400e03df4ad486fca5ebf19

    • SHA256

      1faf6ee59f9fa7879adbcb03a7f86dde4647822cfb51124bba01788bc9bbb028

    • SHA512

      0d370ef5cdb1dd9f141a705a90f8bb9b7e610749ebebfb387bb191e65fa85259524c8cdbf78a91104a35a07f7804a359cd985674eca5c01bec5fda4f56cb5b00

    Score
    10/10
    • Locky

      Ransomware strain released in 2016, with advanced features like anti-analysis.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks