General

  • Target

    0670326e0572ca61e6a1f9b654088f5ac91fd3426dcba932377c801763fe5906

  • Size

    253KB

  • Sample

    220628-tda6jaaegl

  • MD5

    265ad655f714e56035e7354a446b9625

  • SHA1

    a5e089faebec56f776b677f1fc95c51feafcea50

  • SHA256

    0670326e0572ca61e6a1f9b654088f5ac91fd3426dcba932377c801763fe5906

  • SHA512

    385437df5fad17fb1a17d686044683f461c14b6a2c507c9cf563bd97e37bc9198226e2866b050d68d849c3e516a17f83d1416874c6e6490b8f17d12b6ae5ceb8

Malware Config

Targets

    • Target

      0670326e0572ca61e6a1f9b654088f5ac91fd3426dcba932377c801763fe5906

    • Size

      253KB

    • MD5

      265ad655f714e56035e7354a446b9625

    • SHA1

      a5e089faebec56f776b677f1fc95c51feafcea50

    • SHA256

      0670326e0572ca61e6a1f9b654088f5ac91fd3426dcba932377c801763fe5906

    • SHA512

      385437df5fad17fb1a17d686044683f461c14b6a2c507c9cf563bd97e37bc9198226e2866b050d68d849c3e516a17f83d1416874c6e6490b8f17d12b6ae5ceb8

    • Locky

      Ransomware strain released in 2016, with advanced features like anti-analysis.

    • Loads dropped DLL

    • Adds Run key to start application

    • Sets desktop wallpaper using registry

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks