General

  • Target

    6c43544d3dfb063ce5ea542cbf022f92b6dff2c294a2925b4159d86ed0daedb9

  • Size

    216KB

  • Sample

    220628-tyk68sceb4

  • MD5

    19504d96584291023f8a183d416a4a1c

  • SHA1

    edfc887e646fa76b3dddad031467f92e0865f736

  • SHA256

    6c43544d3dfb063ce5ea542cbf022f92b6dff2c294a2925b4159d86ed0daedb9

  • SHA512

    5131bcd4a0960092057124db8e15f76fb866ffbbf523cdbb95a249e67fa661e0445ec32617beced03df7abc316512661cd04da43fd8e6cb888b26730d32a4100

Score
10/10

Malware Config

Targets

    • Target

      6c43544d3dfb063ce5ea542cbf022f92b6dff2c294a2925b4159d86ed0daedb9

    • Size

      216KB

    • MD5

      19504d96584291023f8a183d416a4a1c

    • SHA1

      edfc887e646fa76b3dddad031467f92e0865f736

    • SHA256

      6c43544d3dfb063ce5ea542cbf022f92b6dff2c294a2925b4159d86ed0daedb9

    • SHA512

      5131bcd4a0960092057124db8e15f76fb866ffbbf523cdbb95a249e67fa661e0445ec32617beced03df7abc316512661cd04da43fd8e6cb888b26730d32a4100

    Score
    10/10
    • Locky

      Ransomware strain released in 2016, with advanced features like anti-analysis.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Deletes itself

    • Loads dropped DLL

    • Sets desktop wallpaper using registry

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks