General

  • Target

    0959cd6de66e71e5999f2f3c2045447c9ee8890bb523ae4b282476f2ded4a70f

  • Size

    153KB

  • Sample

    220628-tdpc6accg8

  • MD5

    af881af558c598b2b6fe2104ce08c03b

  • SHA1

    e09b6e6528ce77fe28c2b6d68c46c3ffc6c30bac

  • SHA256

    0959cd6de66e71e5999f2f3c2045447c9ee8890bb523ae4b282476f2ded4a70f

  • SHA512

    bc93b1e9399233e5266185c58e51fc6aab36d814ba086bed90ed82c04913c9e150593aeb89d9f8eb989e9e89fcb698a6eed0c946b49c6c6559b0c443cb386581

Malware Config

Targets

    • Target

      0959cd6de66e71e5999f2f3c2045447c9ee8890bb523ae4b282476f2ded4a70f

    • Size

      153KB

    • MD5

      af881af558c598b2b6fe2104ce08c03b

    • SHA1

      e09b6e6528ce77fe28c2b6d68c46c3ffc6c30bac

    • SHA256

      0959cd6de66e71e5999f2f3c2045447c9ee8890bb523ae4b282476f2ded4a70f

    • SHA512

      bc93b1e9399233e5266185c58e51fc6aab36d814ba086bed90ed82c04913c9e150593aeb89d9f8eb989e9e89fcb698a6eed0c946b49c6c6559b0c443cb386581

    • Locky

      Ransomware strain released in 2016, with advanced features like anti-analysis.

    • suricata: ET MALWARE Ransomware Locky CnC Beacon 21 May

      suricata: ET MALWARE Ransomware Locky CnC Beacon 21 May

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Deletes itself

    • Adds Run key to start application

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v6

Tasks