General

  • Target

    2024-05-23_0857a43be9a5a77035b72d38cde3485a_cryptolocker

  • Size

    38KB

  • Sample

    240523-hgw2mage92

  • MD5

    0857a43be9a5a77035b72d38cde3485a

  • SHA1

    1e74ffd9861a8650c3ca7ebb489f65391d94c868

  • SHA256

    f1ce3c72a279883cc21c2ac7d70d45a7cf5ff5eac59d7456282c276c3c61293f

  • SHA512

    7042c12c160b3d8e55d97bc8d3b62c9fff1c75d8ffea4568186362a7a136e49f2384643b8c187d334191b31ee526bd4cab212a8fafb0e66af448f1c2a19875f1

  • SSDEEP

    384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSzn1KkZCb9q8INBjPP8ui:b/yC4GyNM01GuQMNXw2PSj1Pqq8oBjU

Score
10/10

Malware Config

Targets

    • Target

      2024-05-23_0857a43be9a5a77035b72d38cde3485a_cryptolocker

    • Size

      38KB

    • MD5

      0857a43be9a5a77035b72d38cde3485a

    • SHA1

      1e74ffd9861a8650c3ca7ebb489f65391d94c868

    • SHA256

      f1ce3c72a279883cc21c2ac7d70d45a7cf5ff5eac59d7456282c276c3c61293f

    • SHA512

      7042c12c160b3d8e55d97bc8d3b62c9fff1c75d8ffea4568186362a7a136e49f2384643b8c187d334191b31ee526bd4cab212a8fafb0e66af448f1c2a19875f1

    • SSDEEP

      384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSzn1KkZCb9q8INBjPP8ui:b/yC4GyNM01GuQMNXw2PSj1Pqq8oBjU

    Score
    9/10
    • Detection of CryptoLocker Variants

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Network Service Discovery

1
T1046

Tasks