General
-
Target
2024-01-25_b9165fd666d2870d92217ccc6ed5be23_cryptolocker
-
Size
105KB
-
Sample
240125-v6v7vabgg4
-
MD5
b9165fd666d2870d92217ccc6ed5be23
-
SHA1
890bd7d409fb62616989c9ae59d9223cd7b74fe8
-
SHA256
48b8870e477a52ed5b39ebcd4bdce672d65c47be58f339d68d3bc18bc7743f13
-
SHA512
8edac65639e3556c2c42c998d3434967af9f8e31441dd60dbba519795d438c6017c067d58cec1fe829952cf743427841f7f9c92025054929fd88e91851d3bf1f
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6Gksa:1nK6a+qdOOtEvwDpja
Behavioral task
behavioral1
Sample
2024-01-25_b9165fd666d2870d92217ccc6ed5be23_cryptolocker.exe
Resource
win7-20231215-en
Malware Config
Targets
-
-
Target
2024-01-25_b9165fd666d2870d92217ccc6ed5be23_cryptolocker
-
Size
105KB
-
MD5
b9165fd666d2870d92217ccc6ed5be23
-
SHA1
890bd7d409fb62616989c9ae59d9223cd7b74fe8
-
SHA256
48b8870e477a52ed5b39ebcd4bdce672d65c47be58f339d68d3bc18bc7743f13
-
SHA512
8edac65639e3556c2c42c998d3434967af9f8e31441dd60dbba519795d438c6017c067d58cec1fe829952cf743427841f7f9c92025054929fd88e91851d3bf1f
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6Gksa:1nK6a+qdOOtEvwDpja
-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-