General
-
Target
2024-01-24_e617fe92a571f0b6cdec642b27971b9c_cryptolocker
-
Size
125KB
-
Sample
240124-1acnhshdb8
-
MD5
e617fe92a571f0b6cdec642b27971b9c
-
SHA1
0eec6574c8a191d9a3472bfb7129eb1b37816b32
-
SHA256
03b4b8e0aa82096967c02b5be3155d7f54e344051aadb262bdda576395d4d91f
-
SHA512
d3624fc10686ee400b1a4226f2d9793a0e8c29b23a13d1afefe7431868a3af06711199be75cda5d8ea7e898a97c404a7917b5e0edb0247d0b83b68fac17b264f
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1eQ:AnBdOOtEvwDpj6zm
Behavioral task
behavioral1
Sample
2024-01-24_e617fe92a571f0b6cdec642b27971b9c_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-24_e617fe92a571f0b6cdec642b27971b9c_cryptolocker.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-01-24_e617fe92a571f0b6cdec642b27971b9c_cryptolocker
-
Size
125KB
-
MD5
e617fe92a571f0b6cdec642b27971b9c
-
SHA1
0eec6574c8a191d9a3472bfb7129eb1b37816b32
-
SHA256
03b4b8e0aa82096967c02b5be3155d7f54e344051aadb262bdda576395d4d91f
-
SHA512
d3624fc10686ee400b1a4226f2d9793a0e8c29b23a13d1afefe7431868a3af06711199be75cda5d8ea7e898a97c404a7917b5e0edb0247d0b83b68fac17b264f
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1eQ:AnBdOOtEvwDpj6zm
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-