General
-
Target
2024-01-18_b116d2d9ecdd57f92833a8806cc7db1f_cryptolocker
-
Size
80KB
-
Sample
240118-28eq7sfgb6
-
MD5
b116d2d9ecdd57f92833a8806cc7db1f
-
SHA1
c2effba94b9a79509125c1535a3a0da0eeda2847
-
SHA256
5238f3b3f7bf4758b14ca15efdbfdb2180c23439f659e95cba845bfa819e023f
-
SHA512
d9bae82328617eaff6b7835957961633883a073b4219ab0da37eb44155bb376b6d83b4b0b39275733c3f21ca4183f999c13e8546952156a576cbd11a8abd66ae
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT78:T6a+rdOOtEvwDpjNQ
Behavioral task
behavioral1
Sample
2024-01-18_b116d2d9ecdd57f92833a8806cc7db1f_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-18_b116d2d9ecdd57f92833a8806cc7db1f_cryptolocker.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-01-18_b116d2d9ecdd57f92833a8806cc7db1f_cryptolocker
-
Size
80KB
-
MD5
b116d2d9ecdd57f92833a8806cc7db1f
-
SHA1
c2effba94b9a79509125c1535a3a0da0eeda2847
-
SHA256
5238f3b3f7bf4758b14ca15efdbfdb2180c23439f659e95cba845bfa819e023f
-
SHA512
d9bae82328617eaff6b7835957961633883a073b4219ab0da37eb44155bb376b6d83b4b0b39275733c3f21ca4183f999c13e8546952156a576cbd11a8abd66ae
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT78:T6a+rdOOtEvwDpjNQ
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-