General
-
Target
2024-01-23_cacfb41ffb93305bda6c57ac18b12910_cryptolocker
-
Size
61KB
-
Sample
240123-axvvhafae4
-
MD5
cacfb41ffb93305bda6c57ac18b12910
-
SHA1
f074a49270e415d8d882dca14aedc65b0e8b7fb8
-
SHA256
5eb8097f1c10201a486d6759d3c00733ca3d8cb5b2ef072419fb27a51b28f923
-
SHA512
f44823c9e2f37633ac95fa4f145612cfbe4272b232dbb72b948dd7fc0c6d9075b237c87b417d8ea2c83ebf81bdde8e19519c5f48451ed24553f4b142aaf2ca12
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYhPO:1nK6a+qdOOtEvwDpjz
Behavioral task
behavioral1
Sample
2024-01-23_cacfb41ffb93305bda6c57ac18b12910_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-23_cacfb41ffb93305bda6c57ac18b12910_cryptolocker.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-01-23_cacfb41ffb93305bda6c57ac18b12910_cryptolocker
-
Size
61KB
-
MD5
cacfb41ffb93305bda6c57ac18b12910
-
SHA1
f074a49270e415d8d882dca14aedc65b0e8b7fb8
-
SHA256
5eb8097f1c10201a486d6759d3c00733ca3d8cb5b2ef072419fb27a51b28f923
-
SHA512
f44823c9e2f37633ac95fa4f145612cfbe4272b232dbb72b948dd7fc0c6d9075b237c87b417d8ea2c83ebf81bdde8e19519c5f48451ed24553f4b142aaf2ca12
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYhPO:1nK6a+qdOOtEvwDpjz
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-