General

  • Target

    3a810cbad7296f83122c4a16b935a723d8019419069a55c939d93c246abed2ac

  • Size

    654KB

  • Sample

    220712-dkmvxagcfp

  • MD5

    693ef59145aa6b9e329f91538855ef64

  • SHA1

    e3067d7c7227af026c0abfbdf7b417c4e294f380

  • SHA256

    3a810cbad7296f83122c4a16b935a723d8019419069a55c939d93c246abed2ac

  • SHA512

    3f0ad7a869823d63d1867f4bf2322e88a909324bab80e7e6d8906237db0aea669326030f16a337980681cfd94c86a955ccb2747ff41be0bf75da112a53693a6b

Malware Config

Targets

    • Target

      3a810cbad7296f83122c4a16b935a723d8019419069a55c939d93c246abed2ac

    • Size

      654KB

    • MD5

      693ef59145aa6b9e329f91538855ef64

    • SHA1

      e3067d7c7227af026c0abfbdf7b417c4e294f380

    • SHA256

      3a810cbad7296f83122c4a16b935a723d8019419069a55c939d93c246abed2ac

    • SHA512

      3f0ad7a869823d63d1867f4bf2322e88a909324bab80e7e6d8906237db0aea669326030f16a337980681cfd94c86a955ccb2747ff41be0bf75da112a53693a6b

    • Locky

      Ransomware strain released in 2016, with advanced features like anti-analysis.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Adds Run key to start application

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Deletion

2
T1107

Modify Registry

2
T1112

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Impact

Inhibit System Recovery

2
T1490

Defacement

1
T1491

Tasks