General

  • Target

    31d61677373c60b18677a461ef8f2c1490d068094e991ee9a4bc2f9d81ee5d26

  • Size

    315KB

  • Sample

    220628-v5pnnsbbfr

  • MD5

    91039844f9f219c09c730928480b328a

  • SHA1

    73299597d8334ddbd71dbe9abd96f508c49e248e

  • SHA256

    31d61677373c60b18677a461ef8f2c1490d068094e991ee9a4bc2f9d81ee5d26

  • SHA512

    34bdbbde22cf61a8711f888c2615a6050f8cd5aad419626a233cf57c620afea722b0a5733fa6e985d3c6ecaeccdcb5ddbd7738121277647bf7f0fc9a268f19c3

Malware Config

Targets

    • Target

      31d61677373c60b18677a461ef8f2c1490d068094e991ee9a4bc2f9d81ee5d26

    • Size

      315KB

    • MD5

      91039844f9f219c09c730928480b328a

    • SHA1

      73299597d8334ddbd71dbe9abd96f508c49e248e

    • SHA256

      31d61677373c60b18677a461ef8f2c1490d068094e991ee9a4bc2f9d81ee5d26

    • SHA512

      34bdbbde22cf61a8711f888c2615a6050f8cd5aad419626a233cf57c620afea722b0a5733fa6e985d3c6ecaeccdcb5ddbd7738121277647bf7f0fc9a268f19c3

    • Locky

      Ransomware strain released in 2016, with advanced features like anti-analysis.

    • suricata: ET MALWARE Ransomware Locky CnC Beacon 21 May

      suricata: ET MALWARE Ransomware Locky CnC Beacon 21 May

    • Deletes itself

    • Adds Run key to start application

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Impact

Defacement

1
T1491

Tasks