General

  • Target

    2024-02-12_5563e7e8f4902a4785121afe42e171cf_cryptolocker

  • Size

    46KB

  • Sample

    240212-yp2vvada72

  • MD5

    5563e7e8f4902a4785121afe42e171cf

  • SHA1

    510c647d1f431b3cc0df188462b7b795a879e960

  • SHA256

    bc6eadb089010235df76fdbd59cba77d58ab800abcf28411e277054aa52685e7

  • SHA512

    bc76990e967268185a0a4289f0da0c73bc21c2ca304451ef785e837214038e0e3f534276699d4469665dbcba8112800f723d57259e250475d9570dd8147f4261

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05WTB6:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ64

Score
10/10

Malware Config

Targets

    • Target

      2024-02-12_5563e7e8f4902a4785121afe42e171cf_cryptolocker

    • Size

      46KB

    • MD5

      5563e7e8f4902a4785121afe42e171cf

    • SHA1

      510c647d1f431b3cc0df188462b7b795a879e960

    • SHA256

      bc6eadb089010235df76fdbd59cba77d58ab800abcf28411e277054aa52685e7

    • SHA512

      bc76990e967268185a0a4289f0da0c73bc21c2ca304451ef785e837214038e0e3f534276699d4469665dbcba8112800f723d57259e250475d9570dd8147f4261

    • SSDEEP

      768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05WTB6:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ64

    Score
    9/10
    • Detection of CryptoLocker Variants

    • Detection of Cryptolocker Samples

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks