General

  • Target

    2024-04-30_4bc5e0a6c4406a9735483c134d9bd874_cryptolocker

  • Size

    49KB

  • Sample

    240430-njkdhaba9y

  • MD5

    4bc5e0a6c4406a9735483c134d9bd874

  • SHA1

    ab9f586af15393ef33f02cf93161d86881e3a553

  • SHA256

    06fa2ded01fdfd502b87a07562fc4ef8e2c306bb4e70031d3e43fea6f3ed7f0f

  • SHA512

    3109d9d51d47949dce66880c49887cc0f697683df2c81e5db8264dd333fe479269bf316e1eaf606409fd348ee3a4827e30ea30c55f9b3f106f2ffd04398a19a0

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Moc1:qmbhXDmjr5MOtEvwDpj5cDtKkQZQQ

Score
10/10

Malware Config

Targets

    • Target

      2024-04-30_4bc5e0a6c4406a9735483c134d9bd874_cryptolocker

    • Size

      49KB

    • MD5

      4bc5e0a6c4406a9735483c134d9bd874

    • SHA1

      ab9f586af15393ef33f02cf93161d86881e3a553

    • SHA256

      06fa2ded01fdfd502b87a07562fc4ef8e2c306bb4e70031d3e43fea6f3ed7f0f

    • SHA512

      3109d9d51d47949dce66880c49887cc0f697683df2c81e5db8264dd333fe479269bf316e1eaf606409fd348ee3a4827e30ea30c55f9b3f106f2ffd04398a19a0

    • SSDEEP

      768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Moc1:qmbhXDmjr5MOtEvwDpj5cDtKkQZQQ

    Score
    9/10
    • Detection of CryptoLocker Variants

    • Detection of Cryptolocker Samples

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks