General

  • Target

    d3d734a52f181dd68bf16aa071e06cf02ee89dee4225c938f86e3aceb33c9c0c.exe

  • Size

    4.0MB

  • Sample

    250208-dj7hxs1pf1

  • MD5

    a2ff8c996cf54224259829654176a406

  • SHA1

    ee665eab5efe95f5a9668a8e0d986a19663c53c3

  • SHA256

    d3d734a52f181dd68bf16aa071e06cf02ee89dee4225c938f86e3aceb33c9c0c

  • SHA512

    3189775adc6eb24a459d12c8ca54bacbcb45a4931ff1c92c11efa28db82f614d08c0eba35f365dad84b8acefcc0f2b6e6c9a360eb7bb327090b28766ff06895a

  • SSDEEP

    98304:J8NPKZC3KHXThoNyx8bOpgSrU4d5SOAy1pHbMuJO:JoPKZC3KHXThoNyx8bOpgSTfX1dFJO

Malware Config

Targets

    • Target

      d3d734a52f181dd68bf16aa071e06cf02ee89dee4225c938f86e3aceb33c9c0c.exe

    • Size

      4.0MB

    • MD5

      a2ff8c996cf54224259829654176a406

    • SHA1

      ee665eab5efe95f5a9668a8e0d986a19663c53c3

    • SHA256

      d3d734a52f181dd68bf16aa071e06cf02ee89dee4225c938f86e3aceb33c9c0c

    • SHA512

      3189775adc6eb24a459d12c8ca54bacbcb45a4931ff1c92c11efa28db82f614d08c0eba35f365dad84b8acefcc0f2b6e6c9a360eb7bb327090b28766ff06895a

    • SSDEEP

      98304:J8NPKZC3KHXThoNyx8bOpgSrU4d5SOAy1pHbMuJO:JoPKZC3KHXThoNyx8bOpgSTfX1dFJO

    • Locky

      Ransomware strain released in 2016, with advanced features like anti-analysis.

    • Locky (Osiris variant)

      Variant of the Locky ransomware seen in the wild since early 2017.

    • Locky family

    • Locky_osiris family

    • Downloads MZ/PE file

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks