General
-
Target
2024-01-25_862fb7858e5217ad87827bb6960c81e2_cryptolocker
-
Size
77KB
-
Sample
240125-v4benacfbk
-
MD5
862fb7858e5217ad87827bb6960c81e2
-
SHA1
923405e570b8fa5c84ea79a3b118bd3e2d53cce0
-
SHA256
e2090f410d4cca626001c53199a367bb00d12fcfbcd48722f806f5cdd5f62255
-
SHA512
3bcb49fe3bfc547d7f7f0fa65c866e83b0d44ebabead165a13ac339b29af7e5441189878debdc23b96d27043c132296d79ed44cd189dd4b387270ef8f272d674
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky7Q5:zCsanOtEvwDpjd
Behavioral task
behavioral1
Sample
2024-01-25_862fb7858e5217ad87827bb6960c81e2_cryptolocker.exe
Resource
win7-20231215-en
Malware Config
Targets
-
-
Target
2024-01-25_862fb7858e5217ad87827bb6960c81e2_cryptolocker
-
Size
77KB
-
MD5
862fb7858e5217ad87827bb6960c81e2
-
SHA1
923405e570b8fa5c84ea79a3b118bd3e2d53cce0
-
SHA256
e2090f410d4cca626001c53199a367bb00d12fcfbcd48722f806f5cdd5f62255
-
SHA512
3bcb49fe3bfc547d7f7f0fa65c866e83b0d44ebabead165a13ac339b29af7e5441189878debdc23b96d27043c132296d79ed44cd189dd4b387270ef8f272d674
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky7Q5:zCsanOtEvwDpjd
-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-