General
-
Target
2024-02-01_2e45863459d11a193df7dd60dccbf682_cryptolocker
-
Size
86KB
-
Sample
240201-kfbqeahehl
-
MD5
2e45863459d11a193df7dd60dccbf682
-
SHA1
cad9ac520540fcd1d1152803fe503da8f2dffb99
-
SHA256
4137ee05cafa134aa388720638980916a7eecb521c22d6fc86125bda147e7b42
-
SHA512
451d6c8b8ee372c3be6d5eec5bbb0bbdc97013921078c24c342bece52bc2efeaa1dfd5279de50d32d7c53de8b641c89b9f9aa4cc6d77dde8821eeaddd1b60f5b
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMghJOa:AnBdOOtEvwDpj6z3
Behavioral task
behavioral1
Sample
2024-02-01_2e45863459d11a193df7dd60dccbf682_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-02-01_2e45863459d11a193df7dd60dccbf682_cryptolocker.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-02-01_2e45863459d11a193df7dd60dccbf682_cryptolocker
-
Size
86KB
-
MD5
2e45863459d11a193df7dd60dccbf682
-
SHA1
cad9ac520540fcd1d1152803fe503da8f2dffb99
-
SHA256
4137ee05cafa134aa388720638980916a7eecb521c22d6fc86125bda147e7b42
-
SHA512
451d6c8b8ee372c3be6d5eec5bbb0bbdc97013921078c24c342bece52bc2efeaa1dfd5279de50d32d7c53de8b641c89b9f9aa4cc6d77dde8821eeaddd1b60f5b
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMghJOa:AnBdOOtEvwDpj6z3
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-