General
-
Target
8514a2eca4090f400a43c4af915eb3ef6e9c15dabe69716189e7c68c72cfa285
-
Size
617KB
-
Sample
220713-sfljlsfhdk
-
MD5
d14bc9efe80aeb7d172cbb590f80eba7
-
SHA1
9d6ea38d9a33446488e3a53ca35669f7ded2b747
-
SHA256
8514a2eca4090f400a43c4af915eb3ef6e9c15dabe69716189e7c68c72cfa285
-
SHA512
cb22f3c7d3f35cc4d149d88caf128229c396123997b52c2dfb70203cbb671f967c20bb1615ec84227d1207d50cacd32daf1360f076d42c50b113949074192b58
Static task
static1
Behavioral task
behavioral1
Sample
8514a2eca4090f400a43c4af915eb3ef6e9c15dabe69716189e7c68c72cfa285.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
8514a2eca4090f400a43c4af915eb3ef6e9c15dabe69716189e7c68c72cfa285.exe
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
8514a2eca4090f400a43c4af915eb3ef6e9c15dabe69716189e7c68c72cfa285
-
Size
617KB
-
MD5
d14bc9efe80aeb7d172cbb590f80eba7
-
SHA1
9d6ea38d9a33446488e3a53ca35669f7ded2b747
-
SHA256
8514a2eca4090f400a43c4af915eb3ef6e9c15dabe69716189e7c68c72cfa285
-
SHA512
cb22f3c7d3f35cc4d149d88caf128229c396123997b52c2dfb70203cbb671f967c20bb1615ec84227d1207d50cacd32daf1360f076d42c50b113949074192b58
Score10/10-
Locky (Lukitus variant)
Variant of the Locky ransomware seen in the wild since late 2017.
-
suricata: ET MALWARE Locky CnC Checkin HTTP Pattern
suricata: ET MALWARE Locky CnC Checkin HTTP Pattern
-
suricata: ET MALWARE Locky CnC checkin Nov 21 M2
suricata: ET MALWARE Locky CnC checkin Nov 21 M2
-
Adds Run key to start application
-
Sets desktop wallpaper using registry
-