General

  • Target

    2024-05-22_4190a8badb15f3ec0bc2f17cdeca669f_cryptolocker

  • Size

    69KB

  • Sample

    240522-czdecahf6t

  • MD5

    4190a8badb15f3ec0bc2f17cdeca669f

  • SHA1

    3ce3d9e9005b6762e4df199f444604eefc3a9238

  • SHA256

    9bbc4dbd375d6a7a19dc51c90cee88f0c4ff456c0c373d6b391749cdb811cd36

  • SHA512

    9dc01a9a23cd81c69a97048c30a4b40d6bb5e086dbdf41746afd3377127be66cafa17a025f150b3d49e1518644a94c84e97d29fe447e282bc40ea4b2101ebebc

  • SSDEEP

    768:quVbxjgQNQXtckstOOtEvwDpjAaDOK6PsED3VK2+ZtyOjgO4r9vFAg2rq6W1A1PY:quJu9cvMOtEvwDpjWYTjipvF2bx1PQAY

Score
10/10
upx

Malware Config

Targets

    • Target

      2024-05-22_4190a8badb15f3ec0bc2f17cdeca669f_cryptolocker

    • Size

      69KB

    • MD5

      4190a8badb15f3ec0bc2f17cdeca669f

    • SHA1

      3ce3d9e9005b6762e4df199f444604eefc3a9238

    • SHA256

      9bbc4dbd375d6a7a19dc51c90cee88f0c4ff456c0c373d6b391749cdb811cd36

    • SHA512

      9dc01a9a23cd81c69a97048c30a4b40d6bb5e086dbdf41746afd3377127be66cafa17a025f150b3d49e1518644a94c84e97d29fe447e282bc40ea4b2101ebebc

    • SSDEEP

      768:quVbxjgQNQXtckstOOtEvwDpjAaDOK6PsED3VK2+ZtyOjgO4r9vFAg2rq6W1A1PY:quJu9cvMOtEvwDpjWYTjipvF2bx1PQAY

    Score
    9/10
    • Detection of CryptoLocker Variants

    • Detection of Cryptolocker Samples

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks