General

  • Target

    7fcdb1feabf0785b7abdb860333954573d6f007fcb39192c71f1273916da607b

  • Size

    258KB

  • Sample

    220628-t1xytaced3

  • MD5

    3b77d00635c85c13992483263fb251f5

  • SHA1

    2b230db9e219c29e5cc7fb6a3a85fc9a78d8310a

  • SHA256

    7fcdb1feabf0785b7abdb860333954573d6f007fcb39192c71f1273916da607b

  • SHA512

    38739928f9c75db5e0a9315b80eed7d12b6f795dbe54cfd84320f31cd776abe1589aadd08d9fa779450f4c4ed10449a95fc493c36c68cbb8dc0c7e97b95ee1ef

Malware Config

Targets

    • Target

      7fcdb1feabf0785b7abdb860333954573d6f007fcb39192c71f1273916da607b

    • Size

      258KB

    • MD5

      3b77d00635c85c13992483263fb251f5

    • SHA1

      2b230db9e219c29e5cc7fb6a3a85fc9a78d8310a

    • SHA256

      7fcdb1feabf0785b7abdb860333954573d6f007fcb39192c71f1273916da607b

    • SHA512

      38739928f9c75db5e0a9315b80eed7d12b6f795dbe54cfd84320f31cd776abe1589aadd08d9fa779450f4c4ed10449a95fc493c36c68cbb8dc0c7e97b95ee1ef

    • Locky

      Ransomware strain released in 2016, with advanced features like anti-analysis.

    • suricata: ET MALWARE Locky CnC Checkin HTTP Pattern

      suricata: ET MALWARE Locky CnC Checkin HTTP Pattern

    • suricata: ET MALWARE Locky CnC checkin Nov 21

      suricata: ET MALWARE Locky CnC checkin Nov 21

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

    • Sets desktop wallpaper using registry

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks