General
-
Target
2024-01-29_f2254403de30613f28c0a8c713b4dac7_cryptolocker
-
Size
55KB
-
Sample
240129-t7ee2sece8
-
MD5
f2254403de30613f28c0a8c713b4dac7
-
SHA1
e2a2158761aaede6afaaa030004eb5e7269bd7b5
-
SHA256
9e304ce7bb7d7b25232e63a7631b2f6933717a43ad714b2c76705525c5513364
-
SHA512
5bfaecccdd7d8a8f0e4717b4256852bea7498efedd8d6bc977894317242a772a45b7ba95d1642cc9c9a22764df1c90bfe664f6117d56eb1027714088f0f0d762
-
SSDEEP
1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61P:BbdDmjr+OtEvwDpjMZ
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-29_f2254403de30613f28c0a8c713b4dac7_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-29_f2254403de30613f28c0a8c713b4dac7_cryptolocker.exe
Resource
win10v2004-20231222-en
Malware Config
Targets
-
-
Target
2024-01-29_f2254403de30613f28c0a8c713b4dac7_cryptolocker
-
Size
55KB
-
MD5
f2254403de30613f28c0a8c713b4dac7
-
SHA1
e2a2158761aaede6afaaa030004eb5e7269bd7b5
-
SHA256
9e304ce7bb7d7b25232e63a7631b2f6933717a43ad714b2c76705525c5513364
-
SHA512
5bfaecccdd7d8a8f0e4717b4256852bea7498efedd8d6bc977894317242a772a45b7ba95d1642cc9c9a22764df1c90bfe664f6117d56eb1027714088f0f0d762
-
SSDEEP
1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61P:BbdDmjr+OtEvwDpjMZ
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-