General
-
Target
5310cd8477893728463d4081547840b909f466bc55037a03adb66f21d4676d51.zip
-
Size
549KB
-
Sample
250326-a249qsvwgx
-
MD5
e6258130f65f6fb25c06fdb9a9262b14
-
SHA1
883d3ce66a239dbb5c6241a968893e5ddac5c8c0
-
SHA256
5310cd8477893728463d4081547840b909f466bc55037a03adb66f21d4676d51
-
SHA512
74a2166073cfbbc09b0e630e7692922ce0effd00947c28f68291794e6cd05786d889293772eb97ff58f8a9d055c88c8c979c71889d323a66feda10cd40396040
-
SSDEEP
12288:+DFOXoq676JYLXIe0MJEe+RQiyiHkELPfDuM0K76S:CPq61LXIVMJPEryiHk0XD/uS
Static task
static1
Behavioral task
behavioral1
Sample
LockerGoga.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
LockerGoga.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
C:\Users\Public\Desktop\README_LOCKED.txt
Targets
-
-
Target
LockerGoga.bin
-
Size
1.2MB
-
MD5
e11502659f6b5c5bd9f78f534bc38fea
-
SHA1
b5fd5c913de8cbb8565d3c7c67c0fbaa4090122b
-
SHA256
c97d9bbc80b573bdeeda3812f4d00e5183493dd0d5805e2508728f65977dda15
-
SHA512
86c8d4556c9e0b7d60ccbfee430eb322388449506ab515549cb8d2785582671f2dc2d2a3bd9daded9853caa8bf94d9f92603a3bc527172a85dc7a83d701f7fd0
-
SSDEEP
24576:645Rt4El7fc/TFJzjJUgrrCq5sNIwQsUGy1q7a9DlIACTp+kqGslRG:Rjt4El7fc/TFJWstwQsPdSDuACTpqhG
-
LockerGoga
LockerGoga is a ransomware that is primarily used in targeted, disruptive attacks.
-
Lockergoga family
-
Renames multiple (4131) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Drops desktop.ini file(s)
-