General

  • Target

    2024-03-02_5dfd753473751da0685dbc79709a5087_cryptolocker

  • Size

    385KB

  • Sample

    240302-vdpvcsfe87

  • MD5

    5dfd753473751da0685dbc79709a5087

  • SHA1

    34eb0c24f08390fe7a9c3238cf4d02e45ec12719

  • SHA256

    7d87771c0bdc3feac638f692586a1317b8d6d9bb69ed28819154c43051dc7c80

  • SHA512

    a3a60af967ce5255d7fd2aef3a88422187a8949192c8ebcbc89ac44dceabb5afa0a00968f43cf4e648774cf26a7399ad090ef84c264acfb2f9e4724cc3edaccb

  • SSDEEP

    6144:JWmw0EuCN0pLWgTO3x5N22vWvLRKKAX5l++SybIvCbZRY:JWkEuCaNT85I2vCMX5l+ZRvyZRY

Malware Config

Targets

    • Target

      2024-03-02_5dfd753473751da0685dbc79709a5087_cryptolocker

    • Size

      385KB

    • MD5

      5dfd753473751da0685dbc79709a5087

    • SHA1

      34eb0c24f08390fe7a9c3238cf4d02e45ec12719

    • SHA256

      7d87771c0bdc3feac638f692586a1317b8d6d9bb69ed28819154c43051dc7c80

    • SHA512

      a3a60af967ce5255d7fd2aef3a88422187a8949192c8ebcbc89ac44dceabb5afa0a00968f43cf4e648774cf26a7399ad090ef84c264acfb2f9e4724cc3edaccb

    • SSDEEP

      6144:JWmw0EuCN0pLWgTO3x5N22vWvLRKKAX5l++SybIvCbZRY:JWkEuCaNT85I2vCMX5l+ZRvyZRY

    • CryptoLocker

      Ransomware family with multiple variants.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks