General
-
Target
2024-01-29_71034d6b98a6b00c00cb869649e34b0d_cryptolocker
-
Size
86KB
-
Sample
240129-jb8c5sedan
-
MD5
71034d6b98a6b00c00cb869649e34b0d
-
SHA1
e54a48946239b4f7dfeb670c4d4300fa05a96795
-
SHA256
908a481a810773fde5d8edcb83877fb2e0159ea80413d7ecb3672ac11aa69ab8
-
SHA512
04a63e3f16f14a5d613a8fc6a7b984efed5bd1a40b93fc42bc85cddf3ee19e57cc14d50c35b9b1cfafe683f2c504adff79d6181654dbd00ced5fcaf93a511445
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMghJO8:AnBdOOtEvwDpj6z9
Behavioral task
behavioral1
Sample
2024-01-29_71034d6b98a6b00c00cb869649e34b0d_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-29_71034d6b98a6b00c00cb869649e34b0d_cryptolocker.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-01-29_71034d6b98a6b00c00cb869649e34b0d_cryptolocker
-
Size
86KB
-
MD5
71034d6b98a6b00c00cb869649e34b0d
-
SHA1
e54a48946239b4f7dfeb670c4d4300fa05a96795
-
SHA256
908a481a810773fde5d8edcb83877fb2e0159ea80413d7ecb3672ac11aa69ab8
-
SHA512
04a63e3f16f14a5d613a8fc6a7b984efed5bd1a40b93fc42bc85cddf3ee19e57cc14d50c35b9b1cfafe683f2c504adff79d6181654dbd00ced5fcaf93a511445
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMghJO8:AnBdOOtEvwDpj6z9
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-