General

  • Target

    2024-02-23_8a5ca1f1ea6229115d0a471c96a80dc7_cryptolocker

  • Size

    34KB

  • Sample

    240223-my7lxafa3v

  • MD5

    8a5ca1f1ea6229115d0a471c96a80dc7

  • SHA1

    9a5616d701c62211d8aec84af080eaba615a0913

  • SHA256

    829baaf34b074e7efe50d68a19a022d3085e2c8b74bff6742785145dfd4b6c2c

  • SHA512

    ef6a7b64be5a4b4e84f7d892474d236e6ea154177b6cb5f3cfd1750cffba52f346c58a1c647537620aae068088f946c25ea7a5d30fabca4383e1201c2e10f1d0

  • SSDEEP

    384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSznHzl6A0X/EIJ3M:b/yC4GyNM01GuQMNXw2PSjH+P1c

Score
10/10

Malware Config

Targets

    • Target

      2024-02-23_8a5ca1f1ea6229115d0a471c96a80dc7_cryptolocker

    • Size

      34KB

    • MD5

      8a5ca1f1ea6229115d0a471c96a80dc7

    • SHA1

      9a5616d701c62211d8aec84af080eaba615a0913

    • SHA256

      829baaf34b074e7efe50d68a19a022d3085e2c8b74bff6742785145dfd4b6c2c

    • SHA512

      ef6a7b64be5a4b4e84f7d892474d236e6ea154177b6cb5f3cfd1750cffba52f346c58a1c647537620aae068088f946c25ea7a5d30fabca4383e1201c2e10f1d0

    • SSDEEP

      384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSznHzl6A0X/EIJ3M:b/yC4GyNM01GuQMNXw2PSjH+P1c

    Score
    9/10
    • Detection of CryptoLocker Variants

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

MITRE ATT&CK Enterprise v15

Tasks