General

  • Target

    3c968374fb5f51d095b4736b7a4db42b9573171c524a1a1e37a1efdfc14125df

  • Size

    590KB

  • Sample

    220703-hrwtlsbfc2

  • MD5

    75e9203373579458f51c3082a9c142ae

  • SHA1

    9272c5e3d29311eacf6cb1f10c9dfa7c63ad7ada

  • SHA256

    3c968374fb5f51d095b4736b7a4db42b9573171c524a1a1e37a1efdfc14125df

  • SHA512

    d13eeb86ee1dcc8816a3fa78c4daa44f80ed15558ec0735405bd1bfa5015515d0a617d4d5c4ce82ef5168acd796ac85ec95273b16e412852eb4ea7cfb506eac1

Score
10/10

Malware Config

Targets

    • Target

      3c968374fb5f51d095b4736b7a4db42b9573171c524a1a1e37a1efdfc14125df

    • Size

      590KB

    • MD5

      75e9203373579458f51c3082a9c142ae

    • SHA1

      9272c5e3d29311eacf6cb1f10c9dfa7c63ad7ada

    • SHA256

      3c968374fb5f51d095b4736b7a4db42b9573171c524a1a1e37a1efdfc14125df

    • SHA512

      d13eeb86ee1dcc8816a3fa78c4daa44f80ed15558ec0735405bd1bfa5015515d0a617d4d5c4ce82ef5168acd796ac85ec95273b16e412852eb4ea7cfb506eac1

    Score
    10/10
    • Locky

      Ransomware strain released in 2016, with advanced features like anti-analysis.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

File Deletion

2
T1107

Modify Registry

1
T1112

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Impact

Inhibit System Recovery

2
T1490

Defacement

1
T1491

Tasks