General

  • Target

    fdbbe50061784f2ffa59ce77cdf267a14a0e6fc624d73ca46320e933137d25ee

  • Size

    228KB

  • Sample

    220628-vtzphacgg4

  • MD5

    87d58f91c873699e0737d2d75118b1a8

  • SHA1

    73e193ae30de15f3bf0a28cb64c6a7c40f935822

  • SHA256

    fdbbe50061784f2ffa59ce77cdf267a14a0e6fc624d73ca46320e933137d25ee

  • SHA512

    8105ed4ec33d277ebb82a4190e54910358fbd95e7478efa01a0e1aa526ad0ebb6d84ef5d7cfe35615e9bfd74c52313621b0d14d8eb76f8196922583c6fa26447

Score
10/10

Malware Config

Targets

    • Target

      fdbbe50061784f2ffa59ce77cdf267a14a0e6fc624d73ca46320e933137d25ee

    • Size

      228KB

    • MD5

      87d58f91c873699e0737d2d75118b1a8

    • SHA1

      73e193ae30de15f3bf0a28cb64c6a7c40f935822

    • SHA256

      fdbbe50061784f2ffa59ce77cdf267a14a0e6fc624d73ca46320e933137d25ee

    • SHA512

      8105ed4ec33d277ebb82a4190e54910358fbd95e7478efa01a0e1aa526ad0ebb6d84ef5d7cfe35615e9bfd74c52313621b0d14d8eb76f8196922583c6fa26447

    Score
    10/10
    • Locky

      Ransomware strain released in 2016, with advanced features like anti-analysis.

    • Deletes itself

    • Loads dropped DLL

    • Sets desktop wallpaper using registry

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks