General
-
Target
2024-01-25_fe952601225e58626c283a5e237e57b9_cryptolocker
-
Size
85KB
-
Sample
240125-1bjhfsgfgk
-
MD5
fe952601225e58626c283a5e237e57b9
-
SHA1
389e8f1b9917d16bbe3966019312347f4ddfaf65
-
SHA256
4fba26f51a060d28dca06f741811c8a82c34e96af9daebfe54dad7e61f672d54
-
SHA512
66d10b06f921e05d652779b2fad1613ece21e8b832d301258ba8f6fddbf9eeab336a2aa5a2f6454f5dbc9bc757adaa52d140c487fee58e83ebfd5172718ca617
-
SSDEEP
768:qkmnjFom/kLyMro2GtOOtEvwDpjeY10Y/YMsvlMdwPK80GQuchoIgtISP:qkmnpomddpMOtEvwDpjJGYQbN/PKwMg5
Behavioral task
behavioral1
Sample
2024-01-25_fe952601225e58626c283a5e237e57b9_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-25_fe952601225e58626c283a5e237e57b9_cryptolocker.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-01-25_fe952601225e58626c283a5e237e57b9_cryptolocker
-
Size
85KB
-
MD5
fe952601225e58626c283a5e237e57b9
-
SHA1
389e8f1b9917d16bbe3966019312347f4ddfaf65
-
SHA256
4fba26f51a060d28dca06f741811c8a82c34e96af9daebfe54dad7e61f672d54
-
SHA512
66d10b06f921e05d652779b2fad1613ece21e8b832d301258ba8f6fddbf9eeab336a2aa5a2f6454f5dbc9bc757adaa52d140c487fee58e83ebfd5172718ca617
-
SSDEEP
768:qkmnjFom/kLyMro2GtOOtEvwDpjeY10Y/YMsvlMdwPK80GQuchoIgtISP:qkmnpomddpMOtEvwDpjJGYQbN/PKwMg5
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-