General
-
Target
5463a73bab1d07f4a43a55b656b1bd24607f9e707654c2f011b428ee64cdffd1
-
Size
182KB
-
Sample
220628-v7mxvsbbhl
-
MD5
f808981cbf3210d6ffb779b144414cac
-
SHA1
6856fd105f9bea73df88706c5abc40c3b3f9a4db
-
SHA256
5463a73bab1d07f4a43a55b656b1bd24607f9e707654c2f011b428ee64cdffd1
-
SHA512
1a4cd00b18faeb2600f74b43dd143259e6d5fd17b60a9dc500d47d1c9ddd21c793df07e8240ff52f09e9fab9b65fc6c1e1cce95be8584e1bbd6980692cb4ac78
Static task
static1
Behavioral task
behavioral1
Sample
5463a73bab1d07f4a43a55b656b1bd24607f9e707654c2f011b428ee64cdffd1.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
5463a73bab1d07f4a43a55b656b1bd24607f9e707654c2f011b428ee64cdffd1.exe
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
5463a73bab1d07f4a43a55b656b1bd24607f9e707654c2f011b428ee64cdffd1
-
Size
182KB
-
MD5
f808981cbf3210d6ffb779b144414cac
-
SHA1
6856fd105f9bea73df88706c5abc40c3b3f9a4db
-
SHA256
5463a73bab1d07f4a43a55b656b1bd24607f9e707654c2f011b428ee64cdffd1
-
SHA512
1a4cd00b18faeb2600f74b43dd143259e6d5fd17b60a9dc500d47d1c9ddd21c793df07e8240ff52f09e9fab9b65fc6c1e1cce95be8584e1bbd6980692cb4ac78
Score10/10-
suricata: ET MALWARE Ransomware Locky CnC Beacon 21 May
suricata: ET MALWARE Ransomware Locky CnC Beacon 21 May
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Deletes itself
-
Adds Run key to start application
-
Sets desktop wallpaper using registry
-