General

  • Target

    2024-02-12_450fb3515b4220a920634cdd38203df3_cryptolocker

  • Size

    55KB

  • Sample

    240212-yn248ada67

  • MD5

    450fb3515b4220a920634cdd38203df3

  • SHA1

    54548ea55856a953f2645d1d6721c4896cb20c92

  • SHA256

    6992a2757eff86f20d802f2e4e9e29b735d62353a4b5cbd00d26b0338b9a8d31

  • SHA512

    891704d976b9c935bdf86ed9395459a1f591a7867bdf534879cbdb9df7b27876f30f2b858abcd55110ac60eb33bfac4a81d2ef3b4fce5104469243e2bb67310c

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFeV0ZOfcpLDWR:zj+soPSMOtEvwDpj4yDU

Score
10/10
upx

Malware Config

Targets

    • Target

      2024-02-12_450fb3515b4220a920634cdd38203df3_cryptolocker

    • Size

      55KB

    • MD5

      450fb3515b4220a920634cdd38203df3

    • SHA1

      54548ea55856a953f2645d1d6721c4896cb20c92

    • SHA256

      6992a2757eff86f20d802f2e4e9e29b735d62353a4b5cbd00d26b0338b9a8d31

    • SHA512

      891704d976b9c935bdf86ed9395459a1f591a7867bdf534879cbdb9df7b27876f30f2b858abcd55110ac60eb33bfac4a81d2ef3b4fce5104469243e2bb67310c

    • SSDEEP

      768:zQz7yVEhs9+syJP6ntOOtEvwDpjFeV0ZOfcpLDWR:zj+soPSMOtEvwDpj4yDU

    Score
    9/10
    • Detection of CryptoLocker Variants

    • Detection of Cryptolocker Samples

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks