General

  • Target

    44834646f6f9ac8ac1caffe6c9266b16abd1074dbd2e676ca008a9ad68e5ae03

  • Size

    259KB

  • Sample

    220628-tqzdwscdf4

  • MD5

    9bbc224fc03c8b5ae456762448c98793

  • SHA1

    d2b3863fd7a04e2a5d868595e61e61540959bef5

  • SHA256

    44834646f6f9ac8ac1caffe6c9266b16abd1074dbd2e676ca008a9ad68e5ae03

  • SHA512

    0977ca4d06037b28cf454435a30fd52f28202fa360190bfcfeedaf5e3ce91be116278946d59a37c21eba62f102075ae364220f43bcb580d61c40227b1b70806e

Malware Config

Targets

    • Target

      44834646f6f9ac8ac1caffe6c9266b16abd1074dbd2e676ca008a9ad68e5ae03

    • Size

      259KB

    • MD5

      9bbc224fc03c8b5ae456762448c98793

    • SHA1

      d2b3863fd7a04e2a5d868595e61e61540959bef5

    • SHA256

      44834646f6f9ac8ac1caffe6c9266b16abd1074dbd2e676ca008a9ad68e5ae03

    • SHA512

      0977ca4d06037b28cf454435a30fd52f28202fa360190bfcfeedaf5e3ce91be116278946d59a37c21eba62f102075ae364220f43bcb580d61c40227b1b70806e

    • Locky

      Ransomware strain released in 2016, with advanced features like anti-analysis.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Deletes itself

    • Adds Run key to start application

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v6

Tasks