General

  • Target

    332abe1f0c0e87d525b7629e00e711945048cf02e0622ab072afbc8107053926

  • Size

    231KB

  • Sample

    220620-d2ssgsdaer

  • MD5

    221b66081f7301bde24f3ec32f71216c

  • SHA1

    c7ac36d8d0414bea71fd67604d0b79b4c7eda831

  • SHA256

    332abe1f0c0e87d525b7629e00e711945048cf02e0622ab072afbc8107053926

  • SHA512

    a761693c888e1c33820ed24ea08f024663702e7ec6747e8960fa887e1775107e537590cd686bc18b32b293892ccb8ddc57ad8dd831628ea34bab31adb80a673d

Malware Config

Targets

    • Target

      332abe1f0c0e87d525b7629e00e711945048cf02e0622ab072afbc8107053926

    • Size

      231KB

    • MD5

      221b66081f7301bde24f3ec32f71216c

    • SHA1

      c7ac36d8d0414bea71fd67604d0b79b4c7eda831

    • SHA256

      332abe1f0c0e87d525b7629e00e711945048cf02e0622ab072afbc8107053926

    • SHA512

      a761693c888e1c33820ed24ea08f024663702e7ec6747e8960fa887e1775107e537590cd686bc18b32b293892ccb8ddc57ad8dd831628ea34bab31adb80a673d

    • Locky

      Ransomware strain released in 2016, with advanced features like anti-analysis.

    • suricata: ET MALWARE Locky CnC Checkin HTTP Pattern

      suricata: ET MALWARE Locky CnC Checkin HTTP Pattern

    • suricata: ET MALWARE Locky CnC checkin Nov 21

      suricata: ET MALWARE Locky CnC checkin Nov 21

    • suricata: ET MALWARE Locky CnC checkin Nov 21 M2

      suricata: ET MALWARE Locky CnC checkin Nov 21 M2

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks