General

  • Target

    48c7a0da6261e557e6cd12e81ba8b577492d477d8d21c0bbd8420dc9cb613867

  • Size

    756KB

  • Sample

    220714-cbst5agehn

  • MD5

    8fb63c10eb2c656dafe47e854906d29b

  • SHA1

    ae45c8e53bbc6e094e12c44bad0da44eb357ca36

  • SHA256

    48c7a0da6261e557e6cd12e81ba8b577492d477d8d21c0bbd8420dc9cb613867

  • SHA512

    baa533df470d47aacb6274c193bc34ddace60957dbcddc39aa130cb11b74ec7ce25d051347c80c19a10ddfab854595b52c8a88b35134eb8b79ae177b49688718

Score
10/10

Malware Config

Targets

    • Target

      48c7a0da6261e557e6cd12e81ba8b577492d477d8d21c0bbd8420dc9cb613867

    • Size

      756KB

    • MD5

      8fb63c10eb2c656dafe47e854906d29b

    • SHA1

      ae45c8e53bbc6e094e12c44bad0da44eb357ca36

    • SHA256

      48c7a0da6261e557e6cd12e81ba8b577492d477d8d21c0bbd8420dc9cb613867

    • SHA512

      baa533df470d47aacb6274c193bc34ddace60957dbcddc39aa130cb11b74ec7ce25d051347c80c19a10ddfab854595b52c8a88b35134eb8b79ae177b49688718

    Score
    10/10
    • Locky

      Ransomware strain released in 2016, with advanced features like anti-analysis.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

File Deletion

2
T1107

Impact

Inhibit System Recovery

2
T1490

Tasks