General

  • Target

    2024-05-23_c593f9803e8c598672edfc3cbd8fdf03_cryptolocker

  • Size

    46KB

  • Sample

    240523-w3t12sbg8s

  • MD5

    c593f9803e8c598672edfc3cbd8fdf03

  • SHA1

    b24448d0c831733f18a919c0d96ecc6ad56dd1ba

  • SHA256

    beb7abbad27715f66a2c221341a386c941eb763b0e4c8f17c6ab17b9c02a295c

  • SHA512

    1786a12a0f522a5c027d5d77c0f29079c1bfcd69138b43e0c0a6e8e45d2e8df5c98325f1eec13699fbd506262bfdee9f82289426c2555d7461b576a299c067ce

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoLn:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ9

Score
10/10

Malware Config

Targets

    • Target

      2024-05-23_c593f9803e8c598672edfc3cbd8fdf03_cryptolocker

    • Size

      46KB

    • MD5

      c593f9803e8c598672edfc3cbd8fdf03

    • SHA1

      b24448d0c831733f18a919c0d96ecc6ad56dd1ba

    • SHA256

      beb7abbad27715f66a2c221341a386c941eb763b0e4c8f17c6ab17b9c02a295c

    • SHA512

      1786a12a0f522a5c027d5d77c0f29079c1bfcd69138b43e0c0a6e8e45d2e8df5c98325f1eec13699fbd506262bfdee9f82289426c2555d7461b576a299c067ce

    • SSDEEP

      768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoLn:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ9

    Score
    9/10
    • Detection of CryptoLocker Variants

    • Detection of Cryptolocker Samples

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks