General
-
Target
2024-11-16_1c2428365c1bcf5ea170a949a75a4e7e_locky
-
Size
142KB
-
Sample
241116-cybt5askcl
-
MD5
1c2428365c1bcf5ea170a949a75a4e7e
-
SHA1
207b67aa344875ae4cf2e660dc0c55e8e6179f47
-
SHA256
1b0528fcbbc8476784150df855cdb2410fbc08ca825accf1622160c5900523be
-
SHA512
73d97bd231adc1075c7320071bb848ee1b009fd99beed78d4194d3f06e80bb26792d7722bcd828823cc3a7302b5e39f6c0c69f434b2ee2c02aec8d2c44ce03fa
-
SSDEEP
3072:bok+l9BrtPYPsZjRGRgVmJdfxT+pkJAKnecZeuv0v:bok+l5BZRGRBJ1xT2kJ7ecg1v
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-16_1c2428365c1bcf5ea170a949a75a4e7e_locky.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-11-16_1c2428365c1bcf5ea170a949a75a4e7e_locky.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2024-11-16_1c2428365c1bcf5ea170a949a75a4e7e_locky
-
Size
142KB
-
MD5
1c2428365c1bcf5ea170a949a75a4e7e
-
SHA1
207b67aa344875ae4cf2e660dc0c55e8e6179f47
-
SHA256
1b0528fcbbc8476784150df855cdb2410fbc08ca825accf1622160c5900523be
-
SHA512
73d97bd231adc1075c7320071bb848ee1b009fd99beed78d4194d3f06e80bb26792d7722bcd828823cc3a7302b5e39f6c0c69f434b2ee2c02aec8d2c44ce03fa
-
SSDEEP
3072:bok+l9BrtPYPsZjRGRgVmJdfxT+pkJAKnecZeuv0v:bok+l5BZRGRBJ1xT2kJ7ecg1v
-
Locky (Osiris variant)
Variant of the Locky ransomware seen in the wild since early 2017.
-
Locky family
-
Locky_osiris family
-
Deletes itself
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Sets desktop wallpaper using registry
-