General

  • Target

    33b62b95281bb0ecbad2523bb99e4853fd516044b8f2b42ef4a1e29903e7bd0f

  • Size

    580KB

  • Sample

    220620-be8t3sbgh9

  • MD5

    86927f4d92665747679ab72a9be87b05

  • SHA1

    35549e85c4cb875e1710afaf274aeead50e06752

  • SHA256

    33b62b95281bb0ecbad2523bb99e4853fd516044b8f2b42ef4a1e29903e7bd0f

  • SHA512

    33255234e1a1a7c19d92e503a57cecef9e1cb46ff5472f2416772a0e9087c111edded597618bb73ee8494c0bc23924d97396b1bc5f2657e946c6e1552696381f

Malware Config

Targets

    • Target

      33b62b95281bb0ecbad2523bb99e4853fd516044b8f2b42ef4a1e29903e7bd0f

    • Size

      580KB

    • MD5

      86927f4d92665747679ab72a9be87b05

    • SHA1

      35549e85c4cb875e1710afaf274aeead50e06752

    • SHA256

      33b62b95281bb0ecbad2523bb99e4853fd516044b8f2b42ef4a1e29903e7bd0f

    • SHA512

      33255234e1a1a7c19d92e503a57cecef9e1cb46ff5472f2416772a0e9087c111edded597618bb73ee8494c0bc23924d97396b1bc5f2657e946c6e1552696381f

    • Locky

      Ransomware strain released in 2016, with advanced features like anti-analysis.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Deletes itself

    • Adds Run key to start application

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v6

Tasks