General
-
Target
2024-01-24_67dfc01eb6545d218d7f4cc2b1767da7_cryptolocker
-
Size
64KB
-
Sample
240124-d7r35shha7
-
MD5
67dfc01eb6545d218d7f4cc2b1767da7
-
SHA1
d438f267f5d85551ef77c90093caac94b6babfd4
-
SHA256
c3873037a96f68cc088ccbeda4dc3b23ad2efd75504153542f8424b80c988ccd
-
SHA512
47a0937c10f51423fde2bf21cdc9502d0d383231dc153e7b71097e87f1ddf0aaf5ecfbbc0e698407f2e15b660809b6e73e8766273e9cfd0c51dad887a4195657
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjY6Up:1nK6a+qdOOtEvwDpj0
Behavioral task
behavioral1
Sample
2024-01-24_67dfc01eb6545d218d7f4cc2b1767da7_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-24_67dfc01eb6545d218d7f4cc2b1767da7_cryptolocker.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-01-24_67dfc01eb6545d218d7f4cc2b1767da7_cryptolocker
-
Size
64KB
-
MD5
67dfc01eb6545d218d7f4cc2b1767da7
-
SHA1
d438f267f5d85551ef77c90093caac94b6babfd4
-
SHA256
c3873037a96f68cc088ccbeda4dc3b23ad2efd75504153542f8424b80c988ccd
-
SHA512
47a0937c10f51423fde2bf21cdc9502d0d383231dc153e7b71097e87f1ddf0aaf5ecfbbc0e698407f2e15b660809b6e73e8766273e9cfd0c51dad887a4195657
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjY6Up:1nK6a+qdOOtEvwDpj0
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-