General
-
Target
2024-02-23_89fa18b6e0de0b0613263a7f7c2552b5_cryptolocker
-
Size
47KB
-
Sample
240223-ypklkaga77
-
MD5
89fa18b6e0de0b0613263a7f7c2552b5
-
SHA1
18cd8f6931f61c74b3bc8fae886e2ffaa8f99af3
-
SHA256
0da959b54501996e301c987df30231a606047dc0cc095ef03278c05881818338
-
SHA512
22322d7651b5f3d2c4120bf23baf9d7fdb9ce0d2e459e8e2b4d1b8f2dc256f25cfec4717b3fff5e69e95a6177504fe67ccb2be9dab724b2986cf6d43b433b1ff
-
SSDEEP
768:bgX4zYcgTEu6QOaryfjqDlC6JFbK37Yl6dIDaI:bgGYcA/53GAA6y37Q6dIV
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-23_89fa18b6e0de0b0613263a7f7c2552b5_cryptolocker.exe
Resource
win10-20240221-ja
Malware Config
Targets
-
-
Target
2024-02-23_89fa18b6e0de0b0613263a7f7c2552b5_cryptolocker
-
Size
47KB
-
MD5
89fa18b6e0de0b0613263a7f7c2552b5
-
SHA1
18cd8f6931f61c74b3bc8fae886e2ffaa8f99af3
-
SHA256
0da959b54501996e301c987df30231a606047dc0cc095ef03278c05881818338
-
SHA512
22322d7651b5f3d2c4120bf23baf9d7fdb9ce0d2e459e8e2b4d1b8f2dc256f25cfec4717b3fff5e69e95a6177504fe67ccb2be9dab724b2986cf6d43b433b1ff
-
SSDEEP
768:bgX4zYcgTEu6QOaryfjqDlC6JFbK37Yl6dIDaI:bgGYcA/53GAA6y37Q6dIV
Score7/10-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Registers COM server for autorun
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Change Default File Association
1