General

  • Target

    11f287ce08df6ccc987f2f0038b3aa2c77266f966564a66c43b7cae2ebdbb5e1

  • Size

    244KB

  • Sample

    220628-te9eqaafam

  • MD5

    1311d9372c3550300d400c3fe83cd867

  • SHA1

    0e9262bbb04ff25d495ae9a6970d083e2e89327f

  • SHA256

    11f287ce08df6ccc987f2f0038b3aa2c77266f966564a66c43b7cae2ebdbb5e1

  • SHA512

    9dde69c084164a42677276a4dbe7d03aa7644904a0f1596bc4be8ec191cf6ffd517ce18bb906bd3c316886760ab8027a07deee5c32a9c7aa6424061da4005fd9

Score
10/10

Malware Config

Targets

    • Target

      11f287ce08df6ccc987f2f0038b3aa2c77266f966564a66c43b7cae2ebdbb5e1

    • Size

      244KB

    • MD5

      1311d9372c3550300d400c3fe83cd867

    • SHA1

      0e9262bbb04ff25d495ae9a6970d083e2e89327f

    • SHA256

      11f287ce08df6ccc987f2f0038b3aa2c77266f966564a66c43b7cae2ebdbb5e1

    • SHA512

      9dde69c084164a42677276a4dbe7d03aa7644904a0f1596bc4be8ec191cf6ffd517ce18bb906bd3c316886760ab8027a07deee5c32a9c7aa6424061da4005fd9

    Score
    10/10
    • Locky

      Ransomware strain released in 2016, with advanced features like anti-analysis.

    • Deletes itself

    • Loads dropped DLL

    • Sets desktop wallpaper using registry

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks