General
-
Target
b65b194c6cc134d56ba3acdcc7bd3051
-
Size
328KB
-
Sample
240306-dn32asba37
-
MD5
b65b194c6cc134d56ba3acdcc7bd3051
-
SHA1
98c7e593d956776addd16d0d3f4647d5d69e8fcc
-
SHA256
acd6287f7fa2e10f6cd00f8fc8e9d8aa6553b2e95186c3190958f5ef40259f66
-
SHA512
a076f13f9b9c07bbf34ea9105d63ae24c2996f1b4cb77f58c3b080e333cb4f19bcbf75d1f3bafe34ee85defed00be41fd22c7af859ca3473d96e3764da202339
-
SSDEEP
6144:WLTEviCT+6HQEs6fwpOqb+kO506PqR0zhIx8mN8e9X5Zlev:diCT+gzGn+tqieNfJS
Static task
static1
Behavioral task
behavioral1
Sample
b65b194c6cc134d56ba3acdcc7bd3051.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b65b194c6cc134d56ba3acdcc7bd3051.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
b65b194c6cc134d56ba3acdcc7bd3051
-
Size
328KB
-
MD5
b65b194c6cc134d56ba3acdcc7bd3051
-
SHA1
98c7e593d956776addd16d0d3f4647d5d69e8fcc
-
SHA256
acd6287f7fa2e10f6cd00f8fc8e9d8aa6553b2e95186c3190958f5ef40259f66
-
SHA512
a076f13f9b9c07bbf34ea9105d63ae24c2996f1b4cb77f58c3b080e333cb4f19bcbf75d1f3bafe34ee85defed00be41fd22c7af859ca3473d96e3764da202339
-
SSDEEP
6144:WLTEviCT+6HQEs6fwpOqb+kO506PqR0zhIx8mN8e9X5Zlev:diCT+gzGn+tqieNfJS
Score10/10-
Locky (Osiris variant)
Variant of the Locky ransomware seen in the wild since early 2017.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Sets desktop wallpaper using registry
-