General

  • Target

    c0f47f5a597be7135d9d2fc23cf2563a3b7117f8272bc794cc745266394e287eN.exe

  • Size

    4.0MB

  • Sample

    250208-h8w6pstpgl

  • MD5

    7e0e9d61b4719a57f69301984f2e29e0

  • SHA1

    ad08f2cc627d9d1bddea42b99003a3ffcb20a1f7

  • SHA256

    c0f47f5a597be7135d9d2fc23cf2563a3b7117f8272bc794cc745266394e287e

  • SHA512

    b7e6a8013fc863107f2b7b3be0fef863a435dc492e4ee3afa4820e1ffc262b947bed009f0ed3567c9eb06b213948a1211117db44142101f3a9d46152006c93a7

  • SSDEEP

    98304:J8NPKZC3KHXThoNyx8bOpgSrU4d5SOAy1pHbMuJ:JoPKZC3KHXThoNyx8bOpgSTfX1dFJ

Malware Config

Targets

    • Target

      c0f47f5a597be7135d9d2fc23cf2563a3b7117f8272bc794cc745266394e287eN.exe

    • Size

      4.0MB

    • MD5

      7e0e9d61b4719a57f69301984f2e29e0

    • SHA1

      ad08f2cc627d9d1bddea42b99003a3ffcb20a1f7

    • SHA256

      c0f47f5a597be7135d9d2fc23cf2563a3b7117f8272bc794cc745266394e287e

    • SHA512

      b7e6a8013fc863107f2b7b3be0fef863a435dc492e4ee3afa4820e1ffc262b947bed009f0ed3567c9eb06b213948a1211117db44142101f3a9d46152006c93a7

    • SSDEEP

      98304:J8NPKZC3KHXThoNyx8bOpgSrU4d5SOAy1pHbMuJ:JoPKZC3KHXThoNyx8bOpgSTfX1dFJ

    • Locky

      Ransomware strain released in 2016, with advanced features like anti-analysis.

    • Locky (Osiris variant)

      Variant of the Locky ransomware seen in the wild since early 2017.

    • Locky family

    • Locky_osiris family

    • Downloads MZ/PE file

    • Deletes itself

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks