General
-
Target
2024-01-26_89276db4cf1b403eb568c63e22c6f1a8_cryptolocker
-
Size
126KB
-
Sample
240126-npa21seaar
-
MD5
89276db4cf1b403eb568c63e22c6f1a8
-
SHA1
e239d787204d4c11e8063947bd3394a33737c7d7
-
SHA256
04210126aac1f6806737e65f46cdc65aca34120e73a2780e4e8f85362cde762c
-
SHA512
4e285225f78653b7df1e570a188fe76bdb95cd74b6815cbcaa2659a6d389044cdb78d1b2197c4367b122600ce3e2f7d83722c031b2999eec94bd05c19815844c
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1ej:AnBdOOtEvwDpj6z5
Behavioral task
behavioral1
Sample
2024-01-26_89276db4cf1b403eb568c63e22c6f1a8_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-26_89276db4cf1b403eb568c63e22c6f1a8_cryptolocker.exe
Resource
win10v2004-20231222-en
Malware Config
Targets
-
-
Target
2024-01-26_89276db4cf1b403eb568c63e22c6f1a8_cryptolocker
-
Size
126KB
-
MD5
89276db4cf1b403eb568c63e22c6f1a8
-
SHA1
e239d787204d4c11e8063947bd3394a33737c7d7
-
SHA256
04210126aac1f6806737e65f46cdc65aca34120e73a2780e4e8f85362cde762c
-
SHA512
4e285225f78653b7df1e570a188fe76bdb95cd74b6815cbcaa2659a6d389044cdb78d1b2197c4367b122600ce3e2f7d83722c031b2999eec94bd05c19815844c
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1ej:AnBdOOtEvwDpj6z5
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-