General
-
Target
2024-01-24_8c9e9a84d5522678e07d43ba99f40b68_cryptolocker
-
Size
55KB
-
Sample
240124-ebyrgshgap
-
MD5
8c9e9a84d5522678e07d43ba99f40b68
-
SHA1
f640de7f6a853d8a3fcb525524275202c431135e
-
SHA256
867fda73677b5156fc931ba1ab8328aa069c8222d34f8481139a519aebd37860
-
SHA512
e287985f1681513f42663721427356cf806166ad28402c2ac656a4047c9148ee902d5f6ce0ff765769e10a852c7181751eec6882de046acd921ec6df342295dd
-
SSDEEP
768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5apJ:z6QFElP6n+gKmddpMOtEvwDpj9aYaX
Behavioral task
behavioral1
Sample
2024-01-24_8c9e9a84d5522678e07d43ba99f40b68_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-24_8c9e9a84d5522678e07d43ba99f40b68_cryptolocker.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-01-24_8c9e9a84d5522678e07d43ba99f40b68_cryptolocker
-
Size
55KB
-
MD5
8c9e9a84d5522678e07d43ba99f40b68
-
SHA1
f640de7f6a853d8a3fcb525524275202c431135e
-
SHA256
867fda73677b5156fc931ba1ab8328aa069c8222d34f8481139a519aebd37860
-
SHA512
e287985f1681513f42663721427356cf806166ad28402c2ac656a4047c9148ee902d5f6ce0ff765769e10a852c7181751eec6882de046acd921ec6df342295dd
-
SSDEEP
768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5apJ:z6QFElP6n+gKmddpMOtEvwDpj9aYaX
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-