General

  • Target

    2c379a21876e829c1eeed773990eabe617d8a605b67a03b953e87dfd2c116852

  • Size

    233KB

  • Sample

    220614-3gfpvsedc7

  • MD5

    13f1cf097fc8c3a883bd1af16be4afad

  • SHA1

    080261b84d573ab3757497c94ae70cbb9e014d20

  • SHA256

    2c379a21876e829c1eeed773990eabe617d8a605b67a03b953e87dfd2c116852

  • SHA512

    c94c5db0547949933fe86e6ee8ab9ff007d8df5155fb9eb28dea66e80e43e7babfbada288d9a542db0522fdaafc0ff2ffb17b7af3aee5e03c769d7866defb022

Score
10/10

Malware Config

Targets

    • Target

      2c379a21876e829c1eeed773990eabe617d8a605b67a03b953e87dfd2c116852

    • Size

      233KB

    • MD5

      13f1cf097fc8c3a883bd1af16be4afad

    • SHA1

      080261b84d573ab3757497c94ae70cbb9e014d20

    • SHA256

      2c379a21876e829c1eeed773990eabe617d8a605b67a03b953e87dfd2c116852

    • SHA512

      c94c5db0547949933fe86e6ee8ab9ff007d8df5155fb9eb28dea66e80e43e7babfbada288d9a542db0522fdaafc0ff2ffb17b7af3aee5e03c769d7866defb022

    Score
    10/10
    • Locky

      Ransomware strain released in 2016, with advanced features like anti-analysis.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks