General

  • Target

    2024-03-02_e58185dfcfc4f42ce7380c34c0642129_cryptolocker

  • Size

    361KB

  • Sample

    240302-v4yvysga35

  • MD5

    e58185dfcfc4f42ce7380c34c0642129

  • SHA1

    9c4420482a202b77d1c984618e3ddb0ef697ac2b

  • SHA256

    525d562263b48390c5cafba03864679b116fb706a167ce4a58e5d60a5f8578ef

  • SHA512

    3981f1546f255a4f56388907864705e324ca0098f2527f3986a254097ef7595fe387a9ccb3d243c122128d0ca72dd02fb02fd3a8b2b17614c341ab5ad49e713c

  • SSDEEP

    6144:UWmw0EuCN0pLWgTO3x5N22vWvLRKKAX5l++SybIvCDniPf:UWkEuCaNT85I2vCMX5l+ZRvaiH

Malware Config

Targets

    • Target

      2024-03-02_e58185dfcfc4f42ce7380c34c0642129_cryptolocker

    • Size

      361KB

    • MD5

      e58185dfcfc4f42ce7380c34c0642129

    • SHA1

      9c4420482a202b77d1c984618e3ddb0ef697ac2b

    • SHA256

      525d562263b48390c5cafba03864679b116fb706a167ce4a58e5d60a5f8578ef

    • SHA512

      3981f1546f255a4f56388907864705e324ca0098f2527f3986a254097ef7595fe387a9ccb3d243c122128d0ca72dd02fb02fd3a8b2b17614c341ab5ad49e713c

    • SSDEEP

      6144:UWmw0EuCN0pLWgTO3x5N22vWvLRKKAX5l++SybIvCDniPf:UWkEuCaNT85I2vCMX5l+ZRvaiH

    • CryptoLocker

      Ransomware family with multiple variants.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks