ID | X0011 |
Type | Ransomware |
Aliases | None |
Platforms | Windows |
Year | 2017 |
Associated ATT&CK Software | None |
Locky Bart is ransomware. [1]
The OASIS Collaborative Automated Course of Action Operations (CACAO) is a standard to implement the course of action playbook model for cybersecurity operations. An example Locky Bart playbook illustrates how CACAO can reference MBC behaviors.
Name | Use |
---|---|
Discovery::Process Discovery (T1057) | Locky Bart gathers information from the victim's machine to create an encryption key. [1] |
Discovery::System Location Discovery::System Language Discovery (T1614.001) | Locky Bart identifies the system language via API. [2] |
Execution::Shared Modules (T1129) | Locky Bart parses PE headers. [2] |
Name | Use |
---|---|
Impact::Data Encrypted for Impact (E1486) | Locky Bart encrypts files for ransom without any connection to the Internet. [1] |
Defense Evasion::Obfuscated Files or Information::Encoding-Standard Algorithm (E1027.m02) | Locky Bart encodes data using XOR. [2] |
Discovery::File and Directory Discovery (E1083) | Locky Bart gets a file size. [2] |
SHA256 Hashes
- c285e376201e2941154ec1a9acd8658cd5e0ea975c694a3fe3e9a9897efc2680
[1] https://blog.malwarebytes.com/threat-analysis/2017/01/locky-bart-ransomware-and-backend-server-analysis/
[2] capa v4.0, analyzed at MITRE on 10/12/2022