Concrete signature match: Ransomware - Encrypts files and demands payment for 32-bit Windows platform, family Locky
Ransom:Win32/Locky is a highly destructive ransomware that encrypts user files and demands a Bitcoin payment for their recovery. It employs multiple Windows utilities (e.g., rundll32, mshta, PowerShell, BITS jobs) for execution and persistence, and communicates with external IP addresses for command and control, leaving a `file-recovery-instructions.html` ransom note.
Relevant strings associated with this threat: - 83.217.8.61 (PEHSTR_EXT) - 31.202.130.9 (PEHSTR_EXT) - 91.234.35.106 (PEHSTR_EXT) - /checkupdate (PEHSTR_EXT) - =$|$=-=.~ (PEHSTR_EXT) - y\PHX& (SNID) - setupapi.dll (PEHSTR_EXT) - file-recovery-instructions.html (PEHSTR_EXT) - The only way to recover your files is to pay .1 Bitcoins (PEHSTR_EXT) - For Help email: help@zerodaysample2018.net (PEHSTR_EXT) - \Leen.pdb (PEHSTR_EXT) - ;\$ ~ (PEHSTR_EXT) - Backup.ocx (PEHSTR_EXT) - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT) - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT) - !#HSTR:ExecutionGuardrails (PEHSTR_EXT) - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT) - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)
rule Ransom_Win32_LockyV2_A_2147908905_0
{
meta:
author = "threatcheck.sh"
detection_name = "Ransom:Win32/LockyV2.A!MTB"
threat_id = "2147908905"
type = "Ransom"
platform = "Win32: Windows 32-bit platform"
family = "LockyV2"
severity = "Critical"
info = "MTB: Microsoft Threat Behavior"
signature_type = "SIGNATURE_TYPE_PEHSTR_EXT"
threshold = "2"
strings_accuracy = "Low"
strings:
$x_2_1 = {33 c8 f7 d1 8b 95 ?? ?? ff ff 2b 95 ?? ?? ff ff 81 f2 ?? ?? ?? ?? 0f 31 33 85} //weight: 2, accuracy: Low
condition:
(filesize < 20MB) and
(all of ($x*))
}Immediately isolate the infected system from the network to prevent further spread. Remove the detected malware using Windows Defender or other reputable anti-malware solutions. Restore encrypted files from secure, offline backups. Investigate the initial compromise vector, patch all systems, and enhance security controls including network segmentation, endpoint detection and response (EDR), and user awareness training.