General
-
Target
2024-01-29_468417601536983db00948917197ecaa_cryptolocker
-
Size
55KB
-
Sample
240129-nvmyrshae5
-
MD5
468417601536983db00948917197ecaa
-
SHA1
c8b5dad74542d82a7f0fbaffb58e31f82e0d838e
-
SHA256
9b57d00322e02944fb892881edba2550100c532909a76b62d61010ca692f9f78
-
SHA512
830c8536167a6203acdea40df9a3ce67446bec2bf0eefd2d799fb55c97864b47eec8e3e67cf4bbf324a283f849067b67c041e92ae65ad40752aa18cf97db0795
-
SSDEEP
768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5ax8Y:z6QFElP6n+gKmddpMOtEvwDpj9aYaF
Behavioral task
behavioral1
Sample
2024-01-29_468417601536983db00948917197ecaa_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-29_468417601536983db00948917197ecaa_cryptolocker.exe
Resource
win10v2004-20231222-en
Malware Config
Targets
-
-
Target
2024-01-29_468417601536983db00948917197ecaa_cryptolocker
-
Size
55KB
-
MD5
468417601536983db00948917197ecaa
-
SHA1
c8b5dad74542d82a7f0fbaffb58e31f82e0d838e
-
SHA256
9b57d00322e02944fb892881edba2550100c532909a76b62d61010ca692f9f78
-
SHA512
830c8536167a6203acdea40df9a3ce67446bec2bf0eefd2d799fb55c97864b47eec8e3e67cf4bbf324a283f849067b67c041e92ae65ad40752aa18cf97db0795
-
SSDEEP
768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5ax8Y:z6QFElP6n+gKmddpMOtEvwDpj9aYaF
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-