Resubmissions

08/03/2025, 17:11

250308-vqjtwazwcz 10

02/02/2025, 15:47

250202-s8dpgazqbp 10

02/02/2025, 15:44

250202-s6mvcszpel 6

General

  • Target

    https://github.com/kh4sh3i/Ransomware-Samples

  • Sample

    250308-vqjtwazwcz

Malware Config

Targets

    • Target

      https://github.com/kh4sh3i/Ransomware-Samples

    • Disables service(s)

    • Locky

      Ransomware strain released in 2016, with advanced features like anti-analysis.

    • Locky family

    • Drops startup file

    • Executes dropped EXE

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Legitimate hosting services abused for malware hosting/C2

    • Network Service Discovery

      Attempt to gather information on host's network.

MITRE ATT&CK Enterprise v15

Tasks