General

  • Target

    874c1f9e84b72abce8462bdab41fc21741b3a1f11c615f5888c79cef25192be2

  • Size

    225KB

  • Sample

    220628-t5eysscef6

  • MD5

    443b93821bc7827700626a682a003d3d

  • SHA1

    502111af98e989de68d8e1fdea884758d5d27538

  • SHA256

    874c1f9e84b72abce8462bdab41fc21741b3a1f11c615f5888c79cef25192be2

  • SHA512

    fc2ec8d4b6a6dbc790f840d83795c1803e9bbec9dbfc8c657c67af813fad558b922d627946202cc755807bd9a283dce6c7c91a8f393aee5798866c53eec3ec00

Malware Config

Targets

    • Target

      874c1f9e84b72abce8462bdab41fc21741b3a1f11c615f5888c79cef25192be2

    • Size

      225KB

    • MD5

      443b93821bc7827700626a682a003d3d

    • SHA1

      502111af98e989de68d8e1fdea884758d5d27538

    • SHA256

      874c1f9e84b72abce8462bdab41fc21741b3a1f11c615f5888c79cef25192be2

    • SHA512

      fc2ec8d4b6a6dbc790f840d83795c1803e9bbec9dbfc8c657c67af813fad558b922d627946202cc755807bd9a283dce6c7c91a8f393aee5798866c53eec3ec00

    • Locky

      Ransomware strain released in 2016, with advanced features like anti-analysis.

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Deletes itself

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v6

Tasks