General

  • Target

    af7797bf0df65314f3173e06b114b0498ee0d76c35a243376d1bc1efc4a01347

  • Size

    256KB

  • Sample

    220628-wx1awadbg2

  • MD5

    beddff97291279cbff84fa55fa85dcc8

  • SHA1

    1a76fc9fcee3ec83e339248197d036789a03e7b8

  • SHA256

    af7797bf0df65314f3173e06b114b0498ee0d76c35a243376d1bc1efc4a01347

  • SHA512

    5c0147e4098afae2dc4a0b801f3b637335801acae0811e99a2c0e0353c8a4433126ff3ace0f276d11c688ea85b8c2b6d7da17f21a489d8c1bddc37f091ce3c6a

Malware Config

Targets

    • Target

      af7797bf0df65314f3173e06b114b0498ee0d76c35a243376d1bc1efc4a01347

    • Size

      256KB

    • MD5

      beddff97291279cbff84fa55fa85dcc8

    • SHA1

      1a76fc9fcee3ec83e339248197d036789a03e7b8

    • SHA256

      af7797bf0df65314f3173e06b114b0498ee0d76c35a243376d1bc1efc4a01347

    • SHA512

      5c0147e4098afae2dc4a0b801f3b637335801acae0811e99a2c0e0353c8a4433126ff3ace0f276d11c688ea85b8c2b6d7da17f21a489d8c1bddc37f091ce3c6a

    • Locky

      Ransomware strain released in 2016, with advanced features like anti-analysis.

    • suricata: ET MALWARE Ransomware Locky CnC Beacon 21 May

      suricata: ET MALWARE Ransomware Locky CnC Beacon 21 May

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Deletes itself

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v6

Tasks