General

  • Target

    2024-05-14_b71638ed12e6384850f0b99e71d0772b_cryptolocker

  • Size

    50KB

  • Sample

    240514-fasphsbb6x

  • MD5

    b71638ed12e6384850f0b99e71d0772b

  • SHA1

    4bffb8f43e5bb6e77a4e3f1881301eff599b1139

  • SHA256

    d81c6818baf10386f0c105a2bad2eb84dc56ae5a32526c2d94672932999969ff

  • SHA512

    924c02092d9795b58ff0cf02d61edbbab524a73b07d37e74af376d0e2227a4ac1353b6dd32dc14c64eeaa221b7ea1273f9ef312f67820c80e1f39318b0dfe6dd

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoccG:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ8

Score
10/10

Malware Config

Targets

    • Target

      2024-05-14_b71638ed12e6384850f0b99e71d0772b_cryptolocker

    • Size

      50KB

    • MD5

      b71638ed12e6384850f0b99e71d0772b

    • SHA1

      4bffb8f43e5bb6e77a4e3f1881301eff599b1139

    • SHA256

      d81c6818baf10386f0c105a2bad2eb84dc56ae5a32526c2d94672932999969ff

    • SHA512

      924c02092d9795b58ff0cf02d61edbbab524a73b07d37e74af376d0e2227a4ac1353b6dd32dc14c64eeaa221b7ea1273f9ef312f67820c80e1f39318b0dfe6dd

    • SSDEEP

      768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoccG:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ8

    Score
    9/10
    • Detection of CryptoLocker Variants

    • Detection of Cryptolocker Samples

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks