General

  • Target

    2024-03-02_535139f45738f1165bc61f294e14f64c_cryptolocker

  • Size

    385KB

  • Sample

    240302-vcbaksfa9z

  • MD5

    535139f45738f1165bc61f294e14f64c

  • SHA1

    9a134aaa90a829a189badff227a80b890b14f960

  • SHA256

    98f1fba0f2d439f905d61a40283fc101f5307bcf3110895a876ed80844f5456d

  • SHA512

    7b175bca8b160229a143bf6fc1e57edc93bc6fcc3849e1dedd7ce1e96653336ad2bb09ba2e94da9eb0cfa2df123a70e142778c7b0e668c8706f61cc4e47ab773

  • SSDEEP

    6144:JWmw0EuCN0pLWgTO3x5N22vWvLRKKAX5l++SybIvC9nuF:JWkEuCaNT85I2vCMX5l+ZRv0nuF

Malware Config

Targets

    • Target

      2024-03-02_535139f45738f1165bc61f294e14f64c_cryptolocker

    • Size

      385KB

    • MD5

      535139f45738f1165bc61f294e14f64c

    • SHA1

      9a134aaa90a829a189badff227a80b890b14f960

    • SHA256

      98f1fba0f2d439f905d61a40283fc101f5307bcf3110895a876ed80844f5456d

    • SHA512

      7b175bca8b160229a143bf6fc1e57edc93bc6fcc3849e1dedd7ce1e96653336ad2bb09ba2e94da9eb0cfa2df123a70e142778c7b0e668c8706f61cc4e47ab773

    • SSDEEP

      6144:JWmw0EuCN0pLWgTO3x5N22vWvLRKKAX5l++SybIvC9nuF:JWkEuCaNT85I2vCMX5l+ZRv0nuF

    • CryptoLocker

      Ransomware family with multiple variants.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks