General
-
Target
c0f47f5a597be7135d9d2fc23cf2563a3b7117f8272bc794cc745266394e287eN.exe
-
Size
4.0MB
-
Sample
250208-h8w6pstpgl
-
MD5
7e0e9d61b4719a57f69301984f2e29e0
-
SHA1
ad08f2cc627d9d1bddea42b99003a3ffcb20a1f7
-
SHA256
c0f47f5a597be7135d9d2fc23cf2563a3b7117f8272bc794cc745266394e287e
-
SHA512
b7e6a8013fc863107f2b7b3be0fef863a435dc492e4ee3afa4820e1ffc262b947bed009f0ed3567c9eb06b213948a1211117db44142101f3a9d46152006c93a7
-
SSDEEP
98304:J8NPKZC3KHXThoNyx8bOpgSrU4d5SOAy1pHbMuJ:JoPKZC3KHXThoNyx8bOpgSTfX1dFJ
Static task
static1
Behavioral task
behavioral1
Sample
c0f47f5a597be7135d9d2fc23cf2563a3b7117f8272bc794cc745266394e287eN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c0f47f5a597be7135d9d2fc23cf2563a3b7117f8272bc794cc745266394e287eN.exe
Resource
win10v2004-20250207-en
Malware Config
Targets
-
-
Target
c0f47f5a597be7135d9d2fc23cf2563a3b7117f8272bc794cc745266394e287eN.exe
-
Size
4.0MB
-
MD5
7e0e9d61b4719a57f69301984f2e29e0
-
SHA1
ad08f2cc627d9d1bddea42b99003a3ffcb20a1f7
-
SHA256
c0f47f5a597be7135d9d2fc23cf2563a3b7117f8272bc794cc745266394e287e
-
SHA512
b7e6a8013fc863107f2b7b3be0fef863a435dc492e4ee3afa4820e1ffc262b947bed009f0ed3567c9eb06b213948a1211117db44142101f3a9d46152006c93a7
-
SSDEEP
98304:J8NPKZC3KHXThoNyx8bOpgSrU4d5SOAy1pHbMuJ:JoPKZC3KHXThoNyx8bOpgSTfX1dFJ
-
Locky (Osiris variant)
Variant of the Locky ransomware seen in the wild since early 2017.
-
Locky family
-
Locky_osiris family
-
Downloads MZ/PE file
-
Deletes itself
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Sets desktop wallpaper using registry
-