General
-
Target
2024-01-28_6a7e10e5b2a4e342e667b65499914bcc_cryptolocker
-
Size
30KB
-
Sample
240128-w46q8sfeh2
-
MD5
6a7e10e5b2a4e342e667b65499914bcc
-
SHA1
f751629615826d94fff9abc845270cb80b051350
-
SHA256
45bc1f7c5ae44e54481e465049e7fbbc0740b207021ee767fa80f7d033cb605f
-
SHA512
1abea206981cd7d15eeafb361e1ed5b0b0d6f8b2e2861006b3ac2da275552ee6b8e9646008cf1e39c2d710fde402b85b9a2b67d1f58afa127fbfff979e57d062
-
SSDEEP
384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSznBEfv:b/yC4GyNM01GuQMNXw2PSjKv
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-28_6a7e10e5b2a4e342e667b65499914bcc_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-28_6a7e10e5b2a4e342e667b65499914bcc_cryptolocker.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-01-28_6a7e10e5b2a4e342e667b65499914bcc_cryptolocker
-
Size
30KB
-
MD5
6a7e10e5b2a4e342e667b65499914bcc
-
SHA1
f751629615826d94fff9abc845270cb80b051350
-
SHA256
45bc1f7c5ae44e54481e465049e7fbbc0740b207021ee767fa80f7d033cb605f
-
SHA512
1abea206981cd7d15eeafb361e1ed5b0b0d6f8b2e2861006b3ac2da275552ee6b8e9646008cf1e39c2d710fde402b85b9a2b67d1f58afa127fbfff979e57d062
-
SSDEEP
384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSznBEfv:b/yC4GyNM01GuQMNXw2PSjKv
Score9/10-
Detection of CryptoLocker Variants
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-