General
-
Target
2024-01-23_20f50208b02ac23e2e0cbbbfe97aadcf_cryptolocker
-
Size
45KB
-
Sample
240123-llzj4ahhc2
-
MD5
20f50208b02ac23e2e0cbbbfe97aadcf
-
SHA1
5b6e0ab0f1280f53bd0b110ecba6bb6d0d5237a5
-
SHA256
6a8e17928f247773eae10719733f136e9b61998acfa39ac70db5e747c4e1bbfe
-
SHA512
c4f7dd536d270a207b2d02d32ed6f7b4956d6fe00ffbf1d036c3f61393e04e232ff3e6c9092f5c73c83032b61e411c2a21d035c828f268c4600130a92b48305c
-
SSDEEP
768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mo4w/:qmbhXDmjr5MOtEvwDpj5cDtKkQZQp
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-23_20f50208b02ac23e2e0cbbbfe97aadcf_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-23_20f50208b02ac23e2e0cbbbfe97aadcf_cryptolocker.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-01-23_20f50208b02ac23e2e0cbbbfe97aadcf_cryptolocker
-
Size
45KB
-
MD5
20f50208b02ac23e2e0cbbbfe97aadcf
-
SHA1
5b6e0ab0f1280f53bd0b110ecba6bb6d0d5237a5
-
SHA256
6a8e17928f247773eae10719733f136e9b61998acfa39ac70db5e747c4e1bbfe
-
SHA512
c4f7dd536d270a207b2d02d32ed6f7b4956d6fe00ffbf1d036c3f61393e04e232ff3e6c9092f5c73c83032b61e411c2a21d035c828f268c4600130a92b48305c
-
SSDEEP
768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mo4w/:qmbhXDmjr5MOtEvwDpj5cDtKkQZQp
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-