General

  • Target

    35a9ffbbe20f8d4ed483916e15052df53714b7d5fb57fa0326cd0b138c4b73a6

  • Size

    218KB

  • Sample

    220626-3fzfksgfb2

  • MD5

    4adfc91f1cc5545b6903a300d11dd3b0

  • SHA1

    eda7667e1081397ba43ccc5d6ba6d76434e05403

  • SHA256

    35a9ffbbe20f8d4ed483916e15052df53714b7d5fb57fa0326cd0b138c4b73a6

  • SHA512

    0ea92491ac4fec5487cca2b1f6570f52ae4597b92b6f6ce0760f487fed97c13db7ee7c348a0865a50c8a068cb5c50ee4af0034272dd053f7418c22903a4f472d

Score
10/10

Malware Config

Targets

    • Target

      35a9ffbbe20f8d4ed483916e15052df53714b7d5fb57fa0326cd0b138c4b73a6

    • Size

      218KB

    • MD5

      4adfc91f1cc5545b6903a300d11dd3b0

    • SHA1

      eda7667e1081397ba43ccc5d6ba6d76434e05403

    • SHA256

      35a9ffbbe20f8d4ed483916e15052df53714b7d5fb57fa0326cd0b138c4b73a6

    • SHA512

      0ea92491ac4fec5487cca2b1f6570f52ae4597b92b6f6ce0760f487fed97c13db7ee7c348a0865a50c8a068cb5c50ee4af0034272dd053f7418c22903a4f472d

    Score
    10/10
    • Locky

      Ransomware strain released in 2016, with advanced features like anti-analysis.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks