General

  • Target

    4a4de5b3e6eb0189b0ccaf6445696e1e167bcd03be5712d352dc2f96257b4876

  • Size

    239KB

  • Sample

    220712-q8f4gsfed3

  • MD5

    70e4f687246a47cec452122577f458be

  • SHA1

    4b33871966fc98360918bbd5231dc7f2eb9bd3b7

  • SHA256

    4a4de5b3e6eb0189b0ccaf6445696e1e167bcd03be5712d352dc2f96257b4876

  • SHA512

    16e75542f96a8f985c1a7d3a6d012d8e0314a8b68f095217acae60c475c6de34408f8029650349536a95fdc094b9e2acbbaa256b65cc939c4025b6e7ab858594

Score
10/10

Malware Config

Targets

    • Target

      4a4de5b3e6eb0189b0ccaf6445696e1e167bcd03be5712d352dc2f96257b4876

    • Size

      239KB

    • MD5

      70e4f687246a47cec452122577f458be

    • SHA1

      4b33871966fc98360918bbd5231dc7f2eb9bd3b7

    • SHA256

      4a4de5b3e6eb0189b0ccaf6445696e1e167bcd03be5712d352dc2f96257b4876

    • SHA512

      16e75542f96a8f985c1a7d3a6d012d8e0314a8b68f095217acae60c475c6de34408f8029650349536a95fdc094b9e2acbbaa256b65cc939c4025b6e7ab858594

    Score
    10/10
    • Locky

      Ransomware strain released in 2016, with advanced features like anti-analysis.

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks