Skip to main content

M2M - Locky Affid=3, ".asasin" 2017-11-01 : "Emailing: AZ123 - 01.11.2017" - "AZ123 - 01.11.2017.doc"

Low
Published: Thu Nov 09 2017 (11/09/2017, 00:00:00 UTC)
Source: CIRCL
Vendor/Project: tlp
Product: white

Description

M2M - Locky Affid=3, ".asasin" 2017-11-01 : "Emailing: AZ123 - 01.11.2017" - "AZ123 - 01.11.2017.doc"

AI-Powered Analysis

AILast updated: 06/18/2025, 19:33:02 UTC

Technical Analysis

The threat described pertains to a variant of the Locky ransomware, identified as "M2M - Locky Affid=3, '.asasin'" active around November 1, 2017. Locky ransomware is a well-known malware family that encrypts victims' files and demands ransom payments for decryption keys. This specific variant appears to propagate via email campaigns, as indicated by the reference to an email subject and attachment naming convention: "Emailing: AZ123 - 01.11.2017" with an attached document named "AZ123 - 01.11.2017.doc". The use of a .doc file suggests that the infection vector relies on malicious Microsoft Word documents, likely containing macros or embedded scripts that execute the ransomware payload once the document is opened and macros are enabled. The technical details classify the threat level as 3 (on an unspecified scale) and the severity as low, with no known exploits in the wild beyond the email distribution method. The absence of affected product versions and patch links indicates this is a malware campaign rather than a vulnerability in a specific software product. Locky ransomware typically encrypts a wide range of file types, impacting confidentiality and availability by denying access to data. The campaign's naming and timing suggest a targeted or mass phishing operation using social engineering to trick users into opening malicious attachments. Given the nature of Locky ransomware, infection leads to file encryption and ransom demands, often payable in cryptocurrencies, with no guaranteed recovery of data without backups or decryption tools. The campaign's reliance on email and document macros highlights the importance of user awareness and endpoint protections.

Potential Impact

For European organizations, the impact of this Locky ransomware variant can be significant, particularly for entities with limited cybersecurity maturity or inadequate email filtering and endpoint protection. The ransomware compromises data availability by encrypting critical files, potentially disrupting business operations, causing financial losses, and damaging reputations. Sectors with high reliance on data integrity and availability, such as healthcare, finance, manufacturing, and public administration, are particularly vulnerable. The low severity rating suggests this variant may have limited sophistication or reach compared to other ransomware strains; however, even low-severity ransomware can cause operational disruptions if successful. The email-based infection vector exploits human factors, making organizations with insufficient user training or weak email security controls more susceptible. Additionally, the lack of known exploits in the wild beyond phishing means the threat is primarily opportunistic rather than targeted, but widespread campaigns can still affect multiple European organizations. Recovery costs include incident response, potential ransom payments, data restoration, and reputational damage. The threat also underscores the ongoing risk posed by macro-enabled documents as an infection vector in Europe, where email remains a primary communication tool.

Mitigation Recommendations

To mitigate this Locky ransomware threat, European organizations should implement several specific measures beyond generic advice: 1) Enforce strict email filtering policies that block or quarantine emails with suspicious attachments, especially macro-enabled Office documents (.doc, .docm). 2) Disable macros by default in Microsoft Office applications and only allow macros from trusted sources, using Group Policy or Office configuration settings. 3) Deploy advanced endpoint protection solutions with behavioral detection capabilities to identify and block ransomware execution and encryption activities. 4) Conduct regular, targeted user awareness training focused on phishing recognition and the risks of enabling macros in unsolicited documents. 5) Implement network segmentation and least privilege principles to limit ransomware propagation if a device is infected. 6) Maintain up-to-date, tested offline backups of critical data to enable recovery without paying ransom. 7) Monitor email traffic and endpoint logs for indicators of compromise related to Locky campaigns, such as unusual document attachments or execution of suspicious scripts. 8) Employ application whitelisting to prevent unauthorized execution of ransomware payloads. 9) Collaborate with national Computer Security Incident Response Teams (CSIRTs) for threat intelligence sharing and incident response support. These targeted controls address the specific infection vector and ransomware behavior observed in this Locky variant.

Need more detailed analysis?Get Pro

Technical Details

Threat Level
3
Analysis
1
Uuid
5a044fae-c0b0-45d4-8f7e-75a9950d210f
Original Timestamp
1510259437

Indicators of Compromise

Hash

ValueDescriptionCopy
hash9280a952e5ff85d8f67bf71f590d00ac
hash081940b655e22f06ba067fd09467b215
hash1b087b85b0f1c2b14dfa1b9c82004de598903a89a76af49ee4c4eed03bfefe24
- Xchecked via VT: 081940b655e22f06ba067fd09467b215
hash69df47a405d55b935cc0d53ccd54c0a8f9067f36
- Xchecked via VT: 081940b655e22f06ba067fd09467b215
hash411510e651f5a3b8687d8e20b492d187f37032d57e3480c9a9a15104516de2a1
- Xchecked via VT: 9280a952e5ff85d8f67bf71f590d00ac
hashb9b508e6defc4f25d48b75d076311e15b81cb8b4
- Xchecked via VT: 9280a952e5ff85d8f67bf71f590d00ac

Url

ValueDescriptionCopy
urlhttp://apply.pam-innovation.com/djhvg3674f343
urlhttp://ist-profy.ru/djhvg3674f343
urlhttp://localesynavesalquiler.com/djhvg3674f343
urlhttp://lopezfranco.com/djhvg3674f343
urlhttp://spooner-motorsport.com/djhvg3674f343
urlhttp://zahntechnik-imlau.de/djhvg3674f343
urlhttp://dvprojekt.hr/Omnnd64335
urlhttp://fuettern24.de/Omnnd64335
urlhttp://pciholog.ru/Omnnd64335
urlhttp://3overpar.com/Omnnd64335
urlhttp://first-paris-properties.com/Omnnd64335
urlhttp://mercurysound.es/Omnnd64335
urlhttp://heckhegrijus.net/
urlhttp://kvonline

Domain

ValueDescriptionCopy
domainapply.pam-innovation.com
domainist-profy.ru
domainlocalesynavesalquiler.com
domainlopezfranco.com
domainspooner-motorsport.com
domainzahntechnik-imlau.de
domaindvprojekt.hr
domainfuettern24.de
domainpciholog.ru
domain3overpar.com
domainfirst-paris-properties.com
domainmercurysound.es
domainheckhegrijus.net

Ip

ValueDescriptionCopy
ip202.129.207.71
apply.pam-innovation.com
ip90.156.144.159
ist-profy.ru
ip91.142.213.150
localesynavesalquiler.com
ip89.140.72.153
lopezfranco.com
ip77.72.150.42
spooner-motorsport.com
ip185.138.24.185
zahntechnik-imlau.de
ip213.202.100.90
dvprojekt.hr
ip176.28.9.111
fuettern24.de
ip89.253.235.118
pciholog.ru
ip98.124.251.167
3overpar.com
ip151.80.157.121
first-paris-properties.com
ip149.62.173.10
mercurysound.es

Link

ValueDescriptionCopy
linkhttps://www.virustotal.com/file/1b087b85b0f1c2b14dfa1b9c82004de598903a89a76af49ee4c4eed03bfefe24/analysis/1509675596/
- Xchecked via VT: 081940b655e22f06ba067fd09467b215
linkhttps://www.virustotal.com/file/411510e651f5a3b8687d8e20b492d187f37032d57e3480c9a9a15104516de2a1/analysis/1510167318/
- Xchecked via VT: 9280a952e5ff85d8f67bf71f590d00ac

Threat ID: 682b810a8ee1a77b717be2c8

Added to database: 5/19/2025, 7:05:46 PM

Last enriched: 6/18/2025, 7:33:02 PM

Last updated: 8/11/2025, 5:37:56 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats