General

  • Target

    2024-03-02_a769c781e3748314825f3effbd176b9b_cryptolocker

  • Size

    400KB

  • Sample

    240302-1dsh5sab27

  • MD5

    a769c781e3748314825f3effbd176b9b

  • SHA1

    23b605d66164573492da31bcdffccc01fd9d3957

  • SHA256

    7160b2b41f1b7d0b6546663586ad8207c13a5e240d23cbedbfc9ba81ac406d1a

  • SHA512

    8456c3718f529d17e182b865e8c8fb2c00f43abfaa4eabd024bafa6874ddc90a4eb624229ddbad5e9f0e244ff0de107fbef116038cb72fff13f703b46145c536

  • SSDEEP

    6144:VWmw0EuCN0pLWgTO3x5N22vWvLRKKAX5l++SybIvCvgCSng:VWkEuCaNT85I2vCMX5l+ZRv9CD

Malware Config

Targets

    • Target

      2024-03-02_a769c781e3748314825f3effbd176b9b_cryptolocker

    • Size

      400KB

    • MD5

      a769c781e3748314825f3effbd176b9b

    • SHA1

      23b605d66164573492da31bcdffccc01fd9d3957

    • SHA256

      7160b2b41f1b7d0b6546663586ad8207c13a5e240d23cbedbfc9ba81ac406d1a

    • SHA512

      8456c3718f529d17e182b865e8c8fb2c00f43abfaa4eabd024bafa6874ddc90a4eb624229ddbad5e9f0e244ff0de107fbef116038cb72fff13f703b46145c536

    • SSDEEP

      6144:VWmw0EuCN0pLWgTO3x5N22vWvLRKKAX5l++SybIvCvgCSng:VWkEuCaNT85I2vCMX5l+ZRv9CD

    • CryptoLocker

      Ransomware family with multiple variants.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks