General
-
Target
2024-01-25_2e08a04cf694a9f07ecf6d16121ef3fc_cryptolocker
-
Size
56KB
-
Sample
240125-vzelhsceaq
-
MD5
2e08a04cf694a9f07ecf6d16121ef3fc
-
SHA1
5c8f711392db144f7283651e4e12419f9339cdfe
-
SHA256
73a16ec2fc5f3098f7a4c61e8797bcd04ac5d366bffc96fce95c152a47d0dea5
-
SHA512
77ad0a811cbe2b850b0ba1ad64f99ca76ad68117427f1192edfb4fb2796e8f66e1166bc874aae0b85f5ba4f1f1f5a06d19b560c884257b7d0d724ba9bae1a982
-
SSDEEP
1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61PTH:BbdDmjr+OtEvwDpjM1
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-25_2e08a04cf694a9f07ecf6d16121ef3fc_cryptolocker.exe
Resource
win7-20231215-en
Malware Config
Targets
-
-
Target
2024-01-25_2e08a04cf694a9f07ecf6d16121ef3fc_cryptolocker
-
Size
56KB
-
MD5
2e08a04cf694a9f07ecf6d16121ef3fc
-
SHA1
5c8f711392db144f7283651e4e12419f9339cdfe
-
SHA256
73a16ec2fc5f3098f7a4c61e8797bcd04ac5d366bffc96fce95c152a47d0dea5
-
SHA512
77ad0a811cbe2b850b0ba1ad64f99ca76ad68117427f1192edfb4fb2796e8f66e1166bc874aae0b85f5ba4f1f1f5a06d19b560c884257b7d0d724ba9bae1a982
-
SSDEEP
1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61PTH:BbdDmjr+OtEvwDpjM1
-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-