General

  • Target

    b428e5d84776ac342681ab069cdcf0585b62868a6407345b508f2c459f870a71

  • Size

    191KB

  • Sample

    220628-wyds9sbdgl

  • MD5

    47380d71be72bb4ff55b5e51f8bdc963

  • SHA1

    c9fa6bfaa364a15a1aec3a8645999bd3fe7cd3af

  • SHA256

    b428e5d84776ac342681ab069cdcf0585b62868a6407345b508f2c459f870a71

  • SHA512

    4b3e4094d8de13dee8f1bcbdc125e91a814fb7a46ce3531326192fad909d6e3b4e912331614bbb302ee18ef0caa14da9f767e554685676b438b89b04d6eb32c8

Malware Config

Targets

    • Target

      b428e5d84776ac342681ab069cdcf0585b62868a6407345b508f2c459f870a71

    • Size

      191KB

    • MD5

      47380d71be72bb4ff55b5e51f8bdc963

    • SHA1

      c9fa6bfaa364a15a1aec3a8645999bd3fe7cd3af

    • SHA256

      b428e5d84776ac342681ab069cdcf0585b62868a6407345b508f2c459f870a71

    • SHA512

      4b3e4094d8de13dee8f1bcbdc125e91a814fb7a46ce3531326192fad909d6e3b4e912331614bbb302ee18ef0caa14da9f767e554685676b438b89b04d6eb32c8

    • Locky

      Ransomware strain released in 2016, with advanced features like anti-analysis.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

    • Sets desktop wallpaper using registry

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks