General
-
Target
2024-01-25_0850ef397d389e4a4cfb80e1d0335180_cryptolocker
-
Size
62KB
-
Sample
240125-vxpzgabee3
-
MD5
0850ef397d389e4a4cfb80e1d0335180
-
SHA1
900e4ca00a2bacffa373c78bdd53335725af6d81
-
SHA256
0bc1b322a4504386c799f00c62d7ce16305bddfabdeb41305e07e0a87ad8a123
-
SHA512
ccb13b3e487fee7b4e9e106a6b87912d8cf2d2acd98535c6997430f51d3a2e4c728e23d153a5db938bc16ca9a6fbce3a352fed9df56e8ef85fe62c256cd464d4
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAo8:1nK6a+qdOOtEvwDpju
Behavioral task
behavioral1
Sample
2024-01-25_0850ef397d389e4a4cfb80e1d0335180_cryptolocker.exe
Resource
win7-20231215-en
Malware Config
Targets
-
-
Target
2024-01-25_0850ef397d389e4a4cfb80e1d0335180_cryptolocker
-
Size
62KB
-
MD5
0850ef397d389e4a4cfb80e1d0335180
-
SHA1
900e4ca00a2bacffa373c78bdd53335725af6d81
-
SHA256
0bc1b322a4504386c799f00c62d7ce16305bddfabdeb41305e07e0a87ad8a123
-
SHA512
ccb13b3e487fee7b4e9e106a6b87912d8cf2d2acd98535c6997430f51d3a2e4c728e23d153a5db938bc16ca9a6fbce3a352fed9df56e8ef85fe62c256cd464d4
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAo8:1nK6a+qdOOtEvwDpju
-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-