General
-
Target
2024-01-19_e65d3b48e8b3d11c0715ac10104cbc8f_cryptolocker
-
Size
61KB
-
Sample
240119-s6rhjshadp
-
MD5
e65d3b48e8b3d11c0715ac10104cbc8f
-
SHA1
9a81f303200244d04f2053c8268dee8e924df275
-
SHA256
b27828ad0c3734c09c0ea801e454a9d20648f94100e8fd75910fc8d81ea8fdc8
-
SHA512
6330164031be45a111d2fdcc1543daae21e85b20f1c69405d54b0c980a78b096a7f8cd268ece431fa12143ff047eccede74310eaff0a270cff3b4105235a332e
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAok:1nK6a+qdOOtEvwDpjG
Behavioral task
behavioral1
Sample
2024-01-19_e65d3b48e8b3d11c0715ac10104cbc8f_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-19_e65d3b48e8b3d11c0715ac10104cbc8f_cryptolocker.exe
Resource
win10v2004-20231222-en
Malware Config
Targets
-
-
Target
2024-01-19_e65d3b48e8b3d11c0715ac10104cbc8f_cryptolocker
-
Size
61KB
-
MD5
e65d3b48e8b3d11c0715ac10104cbc8f
-
SHA1
9a81f303200244d04f2053c8268dee8e924df275
-
SHA256
b27828ad0c3734c09c0ea801e454a9d20648f94100e8fd75910fc8d81ea8fdc8
-
SHA512
6330164031be45a111d2fdcc1543daae21e85b20f1c69405d54b0c980a78b096a7f8cd268ece431fa12143ff047eccede74310eaff0a270cff3b4105235a332e
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAok:1nK6a+qdOOtEvwDpjG
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-