General
-
Target
2024-01-18_f74f06d6655fdb7fd931ed48fb2cff93_cryptolocker
-
Size
74KB
-
Sample
240118-3k3c2agffl
-
MD5
f74f06d6655fdb7fd931ed48fb2cff93
-
SHA1
aa6f5be0b064187b90fecec97c167c07c08daad6
-
SHA256
8b48aa12dff30faaee34df085dd11a8cab4d5e4b74afb6951fef39f9fa2f6f14
-
SHA512
aca28580f2859d66a57d654691682af62f9d972e22ba7b2d34577fc1a6ce6fdbfd9211dc3c56c317447d6b6ba632998da7010bc50ded189ba47d6e5fcd44197e
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdJcbD:T6a+rdOOtEvwDpjNtSD
Behavioral task
behavioral1
Sample
2024-01-18_f74f06d6655fdb7fd931ed48fb2cff93_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-18_f74f06d6655fdb7fd931ed48fb2cff93_cryptolocker.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-01-18_f74f06d6655fdb7fd931ed48fb2cff93_cryptolocker
-
Size
74KB
-
MD5
f74f06d6655fdb7fd931ed48fb2cff93
-
SHA1
aa6f5be0b064187b90fecec97c167c07c08daad6
-
SHA256
8b48aa12dff30faaee34df085dd11a8cab4d5e4b74afb6951fef39f9fa2f6f14
-
SHA512
aca28580f2859d66a57d654691682af62f9d972e22ba7b2d34577fc1a6ce6fdbfd9211dc3c56c317447d6b6ba632998da7010bc50ded189ba47d6e5fcd44197e
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdJcbD:T6a+rdOOtEvwDpjNtSD
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-