General

  • Target

    2024-06-12_022e872535aa9e63cc3581ab61ec70d2_cryptolocker

  • Size

    25KB

  • Sample

    240612-nje4sawfll

  • MD5

    022e872535aa9e63cc3581ab61ec70d2

  • SHA1

    afcff7274f5a022e2783afa9ce3d9c7c57f16fd1

  • SHA256

    5387cc193ecbd9a76163d9281cefd716005d9e1677dce504815b91e2692792c5

  • SHA512

    0603ae671c75bf4c90e51227666b178dd03d4a01c88fe001f83b2e0415e74bc1853316b2fc22c1e9d2c304dc2b5dd52742dce28bdf8e20ffa4cc64860bfb1efa

  • SSDEEP

    384:bCj4PdKCpD2jXUrMkeaNJawcudoD7Uh/zzRsTE:bYOdVB2jXUrMkvnbcuyD7UFXOo

Score
10/10

Malware Config

Targets

    • Target

      2024-06-12_022e872535aa9e63cc3581ab61ec70d2_cryptolocker

    • Size

      25KB

    • MD5

      022e872535aa9e63cc3581ab61ec70d2

    • SHA1

      afcff7274f5a022e2783afa9ce3d9c7c57f16fd1

    • SHA256

      5387cc193ecbd9a76163d9281cefd716005d9e1677dce504815b91e2692792c5

    • SHA512

      0603ae671c75bf4c90e51227666b178dd03d4a01c88fe001f83b2e0415e74bc1853316b2fc22c1e9d2c304dc2b5dd52742dce28bdf8e20ffa4cc64860bfb1efa

    • SSDEEP

      384:bCj4PdKCpD2jXUrMkeaNJawcudoD7Uh/zzRsTE:bYOdVB2jXUrMkvnbcuyD7UFXOo

    Score
    9/10
    • Detection of CryptoLocker Variants

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

MITRE ATT&CK Enterprise v15

Tasks