LockerGoga is ransomware that has been tied to various attacks on European companies. It was first reported upon in January 2019.[1][2]
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1531 | Account Access Removal |
LockerGoga has been observed changing account passwords and logging off current users.[2][1] |
|
Enterprise | T1486 | Data Encrypted for Impact |
LockerGoga has encrypted files, including core Windows OS files, using RSA-OAEP MGF1 and then demanded Bitcoin be paid for the decryption key.[2][1][3] |
|
Enterprise | T1562 | .001 | Impair Defenses: Disable or Modify Tools |
LockerGoga installation has been immediately preceded by a "task kill" command in order to disable anti-virus.[3] |
Enterprise | T1070 | .004 | Indicator Removal on Host: File Deletion |
LockerGoga has been observed deleting its original launcher after execution.[2] |
Enterprise | T1570 | Lateral Tool Transfer |
LockerGoga has been observed moving around the victim network via SMB, indicating the actors behind this ransomware are manually copying files form computer to computer instead of self-propagating.[1] |
|
Enterprise | T1553 | .002 | Subvert Trust Controls: Code Signing |
LockerGoga has been signed with stolen certificates in order to make it look more legitimate.[3] |
Enterprise | T1529 | System Shutdown/Reboot |
LockerGoga has been observed shutting down infected systems.[3] |
ID | Name | References |
---|---|---|
G0037 | FIN6 |