General

  • Target

    Ransomware.Locky.zip

  • Size

    125KB

  • Sample

    240915-1ztckavhmp

  • MD5

    b265305541dce2a140da7802442fbac4

  • SHA1

    63d0b780954a2bc96b3a77d9a2b3369d865bf1fd

  • SHA256

    0537fa38b88755f39df1cd774b907ec759dacab2388dc0109f4db9f0e9d191a0

  • SHA512

    af65384f814633fe1cde8bf4a3a1a8f083c7f5f0b7f105d47f3324cd2a8c9184ccf13cb3e43b47473d52f39f4151e7a9da1e9a16868da50abb74fcbc47724282

  • SSDEEP

    1536:6mXbzYYlSESr+LdgbfzNTBstcc6yVeHuwuY5pzl5Lypx0DIY6KQOoTFKmN9YMKW8:dbSr+Jg7lB2cV1aQ+WQVTFX9YPGQi1Mf

Malware Config

Targets

    • Target

      Locky

    • Size

      180KB

    • MD5

      b06d9dd17c69ed2ae75d9e40b2631b42

    • SHA1

      b606aaa402bfe4a15ef80165e964d384f25564e4

    • SHA256

      bc98c8b22461a2c2631b2feec399208fdc4ecd1cd2229066c2f385caa958daa3

    • SHA512

      8e54aca4feb51611142c1f2bf303200113604013c2603eea22d72d00297cb1cb40a2ef11f5129989cd14f90e495db79bffd15bd6282ff564c4af7975b1610c1c

    • SSDEEP

      3072:gzWgfLlUc7CIJ1tkZaQyjhOosc8MKi6KDXnLCtyAR0u1cZ86:gdLl4wkZa/UDiD7ukst1H6

    • Locky

      Ransomware strain released in 2016, with advanced features like anti-analysis.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks