General
-
Target
2024-02-01_9d3defaa4516e60d9afee2cb30f03fac_cryptolocker
-
Size
60KB
-
Sample
240201-lczhqsbbaq
-
MD5
9d3defaa4516e60d9afee2cb30f03fac
-
SHA1
6e281474026d1b0603eeedf42bd6e55a143f090c
-
SHA256
2bd3ba82bc1d41d1734e6530f2d3be0fa97c82e7f47c08bda30756cfa03f34af
-
SHA512
f6ebb108f5f6e351a99d016e57d1e5641d9392e0c4d4bbed0a8b31a5ce2302299fcd28e0a770b1fb05a2e6a503dabbfa64af34099b5f6d93ec75a507f95812c2
-
SSDEEP
1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgts0:BbdDmjr+OtEvwDpjM8c
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-01_9d3defaa4516e60d9afee2cb30f03fac_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-01_9d3defaa4516e60d9afee2cb30f03fac_cryptolocker.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-02-01_9d3defaa4516e60d9afee2cb30f03fac_cryptolocker
-
Size
60KB
-
MD5
9d3defaa4516e60d9afee2cb30f03fac
-
SHA1
6e281474026d1b0603eeedf42bd6e55a143f090c
-
SHA256
2bd3ba82bc1d41d1734e6530f2d3be0fa97c82e7f47c08bda30756cfa03f34af
-
SHA512
f6ebb108f5f6e351a99d016e57d1e5641d9392e0c4d4bbed0a8b31a5ce2302299fcd28e0a770b1fb05a2e6a503dabbfa64af34099b5f6d93ec75a507f95812c2
-
SSDEEP
1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgts0:BbdDmjr+OtEvwDpjM8c
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-