2016-12-12 - "OSIRIS" VARIANT LOCKY RANSOMWARE FROM .JSE FILES

NOTICE:

ASSOCIATED FILES:

NOTES:


Shown above:  Chain of events for an infection from this malspam.

 

EMAILS

SUBJECT LINES:

 


Shown above:  Data from 20 emails pushing Locky ransomware (part 1 of 2).

 


Shown above:  Data from 20 emails pushing Locky ransomware (part 2 of 2).

 


Shown above:  An example from these emails.

 

TRAFFIC


Shown above:  An example of infection traffic by the Excel sheets from one of the emails.

 

EXAMPLES OF TRAFFIC GENERATED BY THE .JSE FILES RETRIEVING THE LOCKY RANSOMWARE BINARY:

 

POST-INFECTION CALLBACK FROM THE LOCKY RANSOMWARE SAMPLE:

 

TOR DOMAIN FROM THE DECRYPTION INSTRUCTIONS:

 

FILE HASHES

LOCKY RANSOMWARE DLL FILE:

 

ZIP ATTACHMENTS FROM THE EMAILS (SHA256 HASH - FILE NAME):

 

.JSE FILES EXTRACTED FROM THE ZIP ATTACHMENTS (SHA256 HASH - FILE NAME):

 

IMAGES


Shown above:  Screen shot from an infected Windows desktop.  Note the .osiris file extension.

 


Shown above:  Ransom payment was 1.5 bitcoin for the infections I generated.

 


Shown above:  There was an error in emails from this wave of emails, causing files extensions for .dzip attachments instead of .zip attachments.

 

Click here to return to the main page.