General
-
Target
2024-01-25_1c32672579aef6ddcaf6fd2a67e98250_cryptolocker
-
Size
82KB
-
Sample
240125-vyevwsbeg2
-
MD5
1c32672579aef6ddcaf6fd2a67e98250
-
SHA1
295a1fa2a58bf6c1a0f193399f371fb1ec09f44d
-
SHA256
3f0c0b7f8cb851cf7084659b0ee17823cd4a1eb70fac11c05ee4c69969f97166
-
SHA512
0a5582de15e5ac023592dd7db4bf14c24d8fb4737e825c1518a0743ced273891adb8f0425842f9a6e0e71c925db78191e83caaf4b807d6618b8a8f3ec159811b
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyJS1bF:zCsanOtEvwDpjD
Behavioral task
behavioral1
Sample
2024-01-25_1c32672579aef6ddcaf6fd2a67e98250_cryptolocker.exe
Resource
win7-20231129-en
Malware Config
Targets
-
-
Target
2024-01-25_1c32672579aef6ddcaf6fd2a67e98250_cryptolocker
-
Size
82KB
-
MD5
1c32672579aef6ddcaf6fd2a67e98250
-
SHA1
295a1fa2a58bf6c1a0f193399f371fb1ec09f44d
-
SHA256
3f0c0b7f8cb851cf7084659b0ee17823cd4a1eb70fac11c05ee4c69969f97166
-
SHA512
0a5582de15e5ac023592dd7db4bf14c24d8fb4737e825c1518a0743ced273891adb8f0425842f9a6e0e71c925db78191e83caaf4b807d6618b8a8f3ec159811b
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyJS1bF:zCsanOtEvwDpjD
-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-