2016-12-20 - "OSIRIS" VARIANT LOCKY RANSOMWARE FROM EXCEL FILES WITH MACROS

NOTICE:

ASSOCIATED FILES:

NOTES:


I know the ransomware authors were thinking of "Loki" when they named it "Locky".  But this current pairing of Egyptian and Norse mythology seems like a weird fit.

 


Shown above:  Chain of events for an infection from this email.

 

THE EMAILS

IP ADDRESSES OF BOTNET HOSTS SENDING THE MALSPAM:

 

SUBJECT LINE:

 

SPOOFED SENDING ADDRESSES:

 

 


Shown above:  Data from 20 email examples pushing Locky ransomware (part 1 of 2).

 


Shown above:  Data from 20 email examples pushing Locky ransomware (part 2 of 2).

 


Shown above:  An example of these emails.

 


Shown above:  An example of these attachments--Excel spreadsheets with malicious macros.

 

TRAFFIC


Shown above:  An example of infection traffic by the Excel macro from one of the emails.

 

TRAFFIC GENERATED BY THE EXCEL SPREADSHEET MACROS RETRIEVING THE LOCKY RANSOMWARE BINARY:

 

POST-INFECTION CALLBACK FROM THE LOCKY RANSOMWARE SAMPLE:

 

TOR DOMAIN FROM THE DECRYPTION INSTRUCTIONS:

 

FILE HASHES

LOCKY RANSOMWARE DLL FILE:

 

EXCEL SPREADSHEET ATTACHMENTS FROM THE EMAILS (SHA256 HASH - FILE NAME):

 

IMAGES


Shown above:  Screen shot from an infected Windows desktop.  Note the .osiris file extension.

 

Click here to return to the main page.