General

  • Target

    423dc1aaaed311349f9932a643a032d18f0589b97275b501a7a7f6955f5aac46

  • Size

    756KB

  • Sample

    220708-dp8ceafadp

  • MD5

    a4872e4fe84e5adcc49ba4c641547821

  • SHA1

    38fbc212ba2fde3dc0d9f3e9fa27df1411604398

  • SHA256

    423dc1aaaed311349f9932a643a032d18f0589b97275b501a7a7f6955f5aac46

  • SHA512

    49ac155e08532ee109d62b8105b14a94cd00b29999e4d49356f72157bea87dd0ee4b1b7d059cd6d7cc08711b2db83bde20824ada64e7b4acb611465d32358ca4

Score
10/10

Malware Config

Targets

    • Target

      423dc1aaaed311349f9932a643a032d18f0589b97275b501a7a7f6955f5aac46

    • Size

      756KB

    • MD5

      a4872e4fe84e5adcc49ba4c641547821

    • SHA1

      38fbc212ba2fde3dc0d9f3e9fa27df1411604398

    • SHA256

      423dc1aaaed311349f9932a643a032d18f0589b97275b501a7a7f6955f5aac46

    • SHA512

      49ac155e08532ee109d62b8105b14a94cd00b29999e4d49356f72157bea87dd0ee4b1b7d059cd6d7cc08711b2db83bde20824ada64e7b4acb611465d32358ca4

    Score
    10/10
    • Locky

      Ransomware strain released in 2016, with advanced features like anti-analysis.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Deletes itself

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

File Deletion

2
T1107

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Impact

Inhibit System Recovery

2
T1490

Defacement

1
T1491

Tasks