General
-
Target
2024-01-18_6eed4edf5bedcf43cfe6978d10b697de_cryptolocker
-
Size
105KB
-
Sample
240118-2vtyzadcbq
-
MD5
6eed4edf5bedcf43cfe6978d10b697de
-
SHA1
da1450cb820b26e45e8c27676b531a0d8051b94f
-
SHA256
c97de838969432e006e3266370746cad911642a7f51b7979e904b390052a7d03
-
SHA512
2cef55e8ee2bdb2f604b7e46abe070496592a84be40aa78366152c15636a06d62e795f3996aeebfc589a61ee9a7abc8f45e75dc1f5b2d2cb2d85ad0a15ef6656
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6Gksq:1nK6a+qdOOtEvwDpjq
Behavioral task
behavioral1
Sample
2024-01-18_6eed4edf5bedcf43cfe6978d10b697de_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-18_6eed4edf5bedcf43cfe6978d10b697de_cryptolocker.exe
Resource
win10v2004-20231222-en
Malware Config
Targets
-
-
Target
2024-01-18_6eed4edf5bedcf43cfe6978d10b697de_cryptolocker
-
Size
105KB
-
MD5
6eed4edf5bedcf43cfe6978d10b697de
-
SHA1
da1450cb820b26e45e8c27676b531a0d8051b94f
-
SHA256
c97de838969432e006e3266370746cad911642a7f51b7979e904b390052a7d03
-
SHA512
2cef55e8ee2bdb2f604b7e46abe070496592a84be40aa78366152c15636a06d62e795f3996aeebfc589a61ee9a7abc8f45e75dc1f5b2d2cb2d85ad0a15ef6656
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6Gksq:1nK6a+qdOOtEvwDpjq
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-