General
-
Target
7fcdb1feabf0785b7abdb860333954573d6f007fcb39192c71f1273916da607b
-
Size
258KB
-
Sample
220628-t1xytaced3
-
MD5
3b77d00635c85c13992483263fb251f5
-
SHA1
2b230db9e219c29e5cc7fb6a3a85fc9a78d8310a
-
SHA256
7fcdb1feabf0785b7abdb860333954573d6f007fcb39192c71f1273916da607b
-
SHA512
38739928f9c75db5e0a9315b80eed7d12b6f795dbe54cfd84320f31cd776abe1589aadd08d9fa779450f4c4ed10449a95fc493c36c68cbb8dc0c7e97b95ee1ef
Static task
static1
Behavioral task
behavioral1
Sample
7fcdb1feabf0785b7abdb860333954573d6f007fcb39192c71f1273916da607b.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
7fcdb1feabf0785b7abdb860333954573d6f007fcb39192c71f1273916da607b.exe
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
7fcdb1feabf0785b7abdb860333954573d6f007fcb39192c71f1273916da607b
-
Size
258KB
-
MD5
3b77d00635c85c13992483263fb251f5
-
SHA1
2b230db9e219c29e5cc7fb6a3a85fc9a78d8310a
-
SHA256
7fcdb1feabf0785b7abdb860333954573d6f007fcb39192c71f1273916da607b
-
SHA512
38739928f9c75db5e0a9315b80eed7d12b6f795dbe54cfd84320f31cd776abe1589aadd08d9fa779450f4c4ed10449a95fc493c36c68cbb8dc0c7e97b95ee1ef
Score10/10-
suricata: ET MALWARE Locky CnC Checkin HTTP Pattern
suricata: ET MALWARE Locky CnC Checkin HTTP Pattern
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Deletes itself
-
Loads dropped DLL
-
Adds Run key to start application
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-