Skip to main content

M2M - Locky 2017-11-07 : Affid=3, offline, ".asasin" : "Emailing: AZ123 - 07.11.2017" - "AZ123 - 07.11.2017.doc"

Low
Published: Thu Nov 09 2017 (11/09/2017, 00:00:00 UTC)
Source: CIRCL
Vendor/Project: tlp
Product: white

Description

M2M - Locky 2017-11-07 : Affid=3, offline, ".asasin" : "Emailing: AZ123 - 07.11.2017" - "AZ123 - 07.11.2017.doc"

AI-Powered Analysis

AILast updated: 06/18/2025, 19:35:08 UTC

Technical Analysis

The threat described is a variant of the Locky ransomware, identified as "M2M - Locky 2017-11-07". Locky ransomware is a well-known malware family that encrypts victims' files and demands ransom payments for decryption keys. This particular variant appears to be distributed via email campaigns, as indicated by the reference to an email subject or attachment name pattern "AZ123 - 07.11.2017.doc" and the file extension ".asasin" which may be associated with the ransomware payload or a dropped file. The malware is categorized as ransomware, which typically encrypts user files to deny access until a ransom is paid. The description notes the campaign was offline at the time of reporting, and no known exploits in the wild are associated with this variant, suggesting it relies on social engineering and phishing rather than exploiting software vulnerabilities. The severity is marked as low by the source, CIRCL, possibly reflecting limited distribution or impact at the time. However, Locky ransomware historically has caused significant disruption by encrypting critical data. The technical details include a threat level of 3 (likely on a scale where 3 is moderate), and the malware is tagged under ransomware categories. No affected software versions or patches are listed, indicating this is a malware threat rather than a vulnerability in a specific product. Indicators of compromise are not provided in this report, limiting direct detection capabilities from this data alone.

Potential Impact

For European organizations, the impact of this Locky ransomware variant could include data encryption leading to loss of access to critical files, operational disruption, and potential financial loss due to ransom payments or recovery costs. While the severity is noted as low, ransomware infections can escalate quickly if phishing defenses fail or if backups are inadequate. The impact on confidentiality is generally low since ransomware primarily targets availability and integrity by encrypting files. However, if the ransomware exfiltrates data before encryption (not indicated here), confidentiality could also be compromised. The ease of exploitation is moderate, relying on successful phishing emails with malicious attachments or links. Organizations with high reliance on email communication and insufficient user awareness training are more vulnerable. The scope of affected systems depends on user interaction and the extent of lateral movement post-infection, which is not detailed here. Overall, the threat could disrupt business continuity, especially for SMEs and organizations lacking robust backup and incident response capabilities.

Mitigation Recommendations

1. Implement advanced email filtering solutions to detect and block phishing emails containing malicious attachments or links, specifically targeting patterns similar to "AZ123 - 07.11.2017.doc" or suspicious file extensions like ".asasin". 2. Conduct targeted user awareness training focused on recognizing phishing attempts and the risks of opening unsolicited email attachments. 3. Maintain regular, tested offline backups of critical data to enable recovery without paying ransom. 4. Employ endpoint detection and response (EDR) tools capable of identifying ransomware behaviors such as rapid file encryption and unusual file extension changes. 5. Apply application whitelisting to prevent execution of unauthorized or unknown programs, especially those dropped via email. 6. Monitor network traffic for unusual activity that may indicate lateral movement or command and control communications. 7. Develop and regularly update an incident response plan specifically addressing ransomware scenarios. 8. Restrict user permissions to limit the ability of ransomware to encrypt files across network shares. 9. Since no patches or exploits are indicated, focus on prevention through user and network defenses rather than patch management for this threat.

Need more detailed analysis?Get Pro

Technical Details

Threat Level
3
Analysis
1
Uuid
5a0451b3-211c-45f2-ac24-403d950d210f
Original Timestamp
1510261554

Indicators of Compromise

Hash

ValueDescriptionCopy
hasha4872e4fe84e5adcc49ba4c641547821
hash423dc1aaaed311349f9932a643a032d18f0589b97275b501a7a7f6955f5aac46
- Xchecked via VT: a4872e4fe84e5adcc49ba4c641547821
hash38fbc212ba2fde3dc0d9f3e9fa27df1411604398
- Xchecked via VT: a4872e4fe84e5adcc49ba4c641547821

Url

ValueDescriptionCopy
urlhttp://c3pconsulting.com/7863
urlhttp://city-hospital.com/7863
urlhttp://developmenttesting.website/7863
urlhttp://ecochart.org/7863
urlhttp://arcusautomatika.ba/mngytr56
urlhttp://2013oakseedessaycontest.com/mngytr56
urlhttp://altarek.com/mngytr56
urlhttp://basarteks.com/mngytr56
urlhttp://amcscomputer.com/mngytr56
urlhttp://bobtheprinter.com/mngytr56
urlhttp://muchinfaket.net/p66/mngytr56

Domain

ValueDescriptionCopy
domainc3pconsulting.com
domaincity-hospital.com
domaindevelopmenttesting.website
domainecochart.org
domainarcusautomatika.ba
domain2013oakseedessaycontest.com
domainaltarek.com
domainbasarteks.com
domainamcscomputer.com
domainbobtheprinter.com
domainmuchinfaket.net

Ip

ValueDescriptionCopy
ip192.186.219.83
c3pconsulting.com
ip148.251.218.75
city-hospital.com
ip195.222.33.183
arcusautomatika.ba
ip108.167.141.148
2013oakseedessaycontest.com
ip67.210.100.133
altarek.com
ip195.87.101.81
basarteks.com
ip216.242.171.101
amcscomputer.com
ip216.228.2.70
bobtheprinter.com

Link

ValueDescriptionCopy
linkhttps://www.virustotal.com/file/423dc1aaaed311349f9932a643a032d18f0589b97275b501a7a7f6955f5aac46/analysis/1510152311/
- Xchecked via VT: a4872e4fe84e5adcc49ba4c641547821

Threat ID: 682b810a8ee1a77b717be1b7

Added to database: 5/19/2025, 7:05:46 PM

Last enriched: 6/18/2025, 7:35:08 PM

Last updated: 7/28/2025, 5:11:16 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats