General

  • Target

    2024-04-28_fab11d14df33cfd72ac71943b0f71b01_cryptolocker

  • Size

    27KB

  • Sample

    240428-n3hc9afd7t

  • MD5

    fab11d14df33cfd72ac71943b0f71b01

  • SHA1

    d1739cf23b64469fa90ccbabc6961b089af61b50

  • SHA256

    82d0832a3524ace8fdbe936f61a01061cb270731ef28ea791c5e19f751e037fe

  • SHA512

    59e6bab614494a49146db1644274583fb3f28aafa6cecb3f27fcc6da1ea8141a143a9298a749b178a10793dbd4a474c8791c1aa7c0e4c9917fa8bbba0d262888

  • SSDEEP

    384:qxOZzyjOnqGAs+8ULueO4NdE8tOOtEvwDpjqIGRYK1sGGYkxOqe:q0ZziOWwULueOSdE8tOOtEvwDpjeYe

Score
10/10

Malware Config

Targets

    • Target

      2024-04-28_fab11d14df33cfd72ac71943b0f71b01_cryptolocker

    • Size

      27KB

    • MD5

      fab11d14df33cfd72ac71943b0f71b01

    • SHA1

      d1739cf23b64469fa90ccbabc6961b089af61b50

    • SHA256

      82d0832a3524ace8fdbe936f61a01061cb270731ef28ea791c5e19f751e037fe

    • SHA512

      59e6bab614494a49146db1644274583fb3f28aafa6cecb3f27fcc6da1ea8141a143a9298a749b178a10793dbd4a474c8791c1aa7c0e4c9917fa8bbba0d262888

    • SSDEEP

      384:qxOZzyjOnqGAs+8ULueO4NdE8tOOtEvwDpjqIGRYK1sGGYkxOqe:q0ZziOWwULueOSdE8tOOtEvwDpjeYe

    Score
    9/10
    • Detection of CryptoLocker Variants

    • Detection of Cryptolocker Samples

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks