General

  • Target

    2024-05-22_4a735a82190c82aab5d225cc47dfce15_cryptolocker

  • Size

    31KB

  • Sample

    240522-cz7yyshf8w

  • MD5

    4a735a82190c82aab5d225cc47dfce15

  • SHA1

    9dc587ebb8c2aa1bd5bf90cd60a82f98c00dbe89

  • SHA256

    9261ebc53eac1c9995ccb5ea25b67f6a55eb9527860842811109e5f0d55e15f0

  • SHA512

    3ea074e0f03548748b6fe344f05a71c2ecd066d55c5ff7a9acc204c051384b955be8cfbfb8bb61837ba3b74cdc7c5692a7a7e40ec5164bfffffa02064e55a805

  • SSDEEP

    384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zznum+U8Ss87vhL:b/yC4GyNM01GuQMNXum+NSnL

Score
10/10

Malware Config

Targets

    • Target

      2024-05-22_4a735a82190c82aab5d225cc47dfce15_cryptolocker

    • Size

      31KB

    • MD5

      4a735a82190c82aab5d225cc47dfce15

    • SHA1

      9dc587ebb8c2aa1bd5bf90cd60a82f98c00dbe89

    • SHA256

      9261ebc53eac1c9995ccb5ea25b67f6a55eb9527860842811109e5f0d55e15f0

    • SHA512

      3ea074e0f03548748b6fe344f05a71c2ecd066d55c5ff7a9acc204c051384b955be8cfbfb8bb61837ba3b74cdc7c5692a7a7e40ec5164bfffffa02064e55a805

    • SSDEEP

      384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zznum+U8Ss87vhL:b/yC4GyNM01GuQMNXum+NSnL

    Score
    9/10
    • Detection of CryptoLocker Variants

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Network Service Discovery

1
T1046

Tasks