General

  • Target

    https://github.com/ytisf/theZoo/blob/master/malware/Binaries/CryptoLocker_22Jan2014/CryptoLocker_22Jan2014.zip

  • Sample

    230331-vg5pzsdb71

Malware Config

Targets

    • Target

      https://github.com/ytisf/theZoo/blob/master/malware/Binaries/CryptoLocker_22Jan2014/CryptoLocker_22Jan2014.zip

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Network Service Scanning

1
T1046

Query Registry

1
T1012

Command and Control

Web Service

1
T1102

Tasks