Resubmissions

23/02/2024, 19:57

240223-ypklkaga77 7

23/02/2024, 19:50

240223-ykqa9agh4t 10

General

  • Target

    2024-02-23_89fa18b6e0de0b0613263a7f7c2552b5_cryptolocker

  • Size

    47KB

  • Sample

    240223-ypklkaga77

  • MD5

    89fa18b6e0de0b0613263a7f7c2552b5

  • SHA1

    18cd8f6931f61c74b3bc8fae886e2ffaa8f99af3

  • SHA256

    0da959b54501996e301c987df30231a606047dc0cc095ef03278c05881818338

  • SHA512

    22322d7651b5f3d2c4120bf23baf9d7fdb9ce0d2e459e8e2b4d1b8f2dc256f25cfec4717b3fff5e69e95a6177504fe67ccb2be9dab724b2986cf6d43b433b1ff

  • SSDEEP

    768:bgX4zYcgTEu6QOaryfjqDlC6JFbK37Yl6dIDaI:bgGYcA/53GAA6y37Q6dIV

Malware Config

Targets

    • Target

      2024-02-23_89fa18b6e0de0b0613263a7f7c2552b5_cryptolocker

    • Size

      47KB

    • MD5

      89fa18b6e0de0b0613263a7f7c2552b5

    • SHA1

      18cd8f6931f61c74b3bc8fae886e2ffaa8f99af3

    • SHA256

      0da959b54501996e301c987df30231a606047dc0cc095ef03278c05881818338

    • SHA512

      22322d7651b5f3d2c4120bf23baf9d7fdb9ce0d2e459e8e2b4d1b8f2dc256f25cfec4717b3fff5e69e95a6177504fe67ccb2be9dab724b2986cf6d43b433b1ff

    • SSDEEP

      768:bgX4zYcgTEu6QOaryfjqDlC6JFbK37Yl6dIDaI:bgGYcA/53GAA6y37Q6dIV

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Registers COM server for autorun

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks