General
-
Target
2024-01-28_c20de4e81b1f8ab996d0b4e0451cbd45_cryptolocker
-
Size
60KB
-
Sample
240128-klm1mahaen
-
MD5
c20de4e81b1f8ab996d0b4e0451cbd45
-
SHA1
6befd0e7fc0c6d8ea9ef92c321050878e9665097
-
SHA256
f4d97d0fcad44173f4e4bb8b6dfcab179a6d99ab4e4bd2fcd2419af5c472bfe0
-
SHA512
1a5a56717ccf3c6d0642942594218dd21c80ae77ea0a34221637d47c2aeded33a105295d8ce6b660aa66150e8fd2ac9a4dcc7181958cbe7e16ef10b68505f617
-
SSDEEP
1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAuZv:z6a+CdOOtEvwDpjQz
Behavioral task
behavioral1
Sample
2024-01-28_c20de4e81b1f8ab996d0b4e0451cbd45_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-28_c20de4e81b1f8ab996d0b4e0451cbd45_cryptolocker.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-01-28_c20de4e81b1f8ab996d0b4e0451cbd45_cryptolocker
-
Size
60KB
-
MD5
c20de4e81b1f8ab996d0b4e0451cbd45
-
SHA1
6befd0e7fc0c6d8ea9ef92c321050878e9665097
-
SHA256
f4d97d0fcad44173f4e4bb8b6dfcab179a6d99ab4e4bd2fcd2419af5c472bfe0
-
SHA512
1a5a56717ccf3c6d0642942594218dd21c80ae77ea0a34221637d47c2aeded33a105295d8ce6b660aa66150e8fd2ac9a4dcc7181958cbe7e16ef10b68505f617
-
SSDEEP
1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAuZv:z6a+CdOOtEvwDpjQz
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-