General

  • Target

    d4fd2fe61b13c70740ebc900e8d88123683790a43dd500e0f660f92e9fa257dc.bin

  • Size

    177KB

  • Sample

    220713-r8ytzaffgq

  • MD5

    01f7db952b1b17d0a090b09018896105

  • SHA1

    aa55039cff3d96c06250941cc9dab1d8abe73e5e

  • SHA256

    d4fd2fe61b13c70740ebc900e8d88123683790a43dd500e0f660f92e9fa257dc

  • SHA512

    238cdf5159810e78df9d19afe8444cda3322d6ea1fd94984f614b0cfde0de8ac77138f226f5280fa2b283225fe47e847ba23dec57dea8687295c7c47ee0f3993

Malware Config

Targets

    • Target

      d4fd2fe61b13c70740ebc900e8d88123683790a43dd500e0f660f92e9fa257dc.bin

    • Size

      177KB

    • MD5

      01f7db952b1b17d0a090b09018896105

    • SHA1

      aa55039cff3d96c06250941cc9dab1d8abe73e5e

    • SHA256

      d4fd2fe61b13c70740ebc900e8d88123683790a43dd500e0f660f92e9fa257dc

    • SHA512

      238cdf5159810e78df9d19afe8444cda3322d6ea1fd94984f614b0cfde0de8ac77138f226f5280fa2b283225fe47e847ba23dec57dea8687295c7c47ee0f3993

    • Locky

      Ransomware strain released in 2016, with advanced features like anti-analysis.

    • suricata: ET MALWARE Locky CnC Checkin HTTP Pattern

      suricata: ET MALWARE Locky CnC Checkin HTTP Pattern

    • suricata: ET MALWARE Locky CnC checkin Nov 21

      suricata: ET MALWARE Locky CnC checkin Nov 21

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Impact

Defacement

1
T1491

Tasks