General
-
Target
2024-02-03_459074cb5a682702d5e7ffe38884180b_cryptolocker
-
Size
104KB
-
Sample
240203-pk5aqsbcek
-
MD5
459074cb5a682702d5e7ffe38884180b
-
SHA1
b543aa9f3853a514ed8e3cba83bd3d09239f7741
-
SHA256
7f4f87fdd36a4ba65c307bbe6092741db70709fbe88cbc6579ab04801406a8b8
-
SHA512
00fe916040d04282358a2f266817374bed328618b395d2d3be580d97b9b13cab96d4331c69315dc87b00d12594096929be5280887479bb82db0a4b5686b962aa
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GksW:1nK6a+qdOOtEvwDpjW
Behavioral task
behavioral1
Sample
2024-02-03_459074cb5a682702d5e7ffe38884180b_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-03_459074cb5a682702d5e7ffe38884180b_cryptolocker.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-02-03_459074cb5a682702d5e7ffe38884180b_cryptolocker
-
Size
104KB
-
MD5
459074cb5a682702d5e7ffe38884180b
-
SHA1
b543aa9f3853a514ed8e3cba83bd3d09239f7741
-
SHA256
7f4f87fdd36a4ba65c307bbe6092741db70709fbe88cbc6579ab04801406a8b8
-
SHA512
00fe916040d04282358a2f266817374bed328618b395d2d3be580d97b9b13cab96d4331c69315dc87b00d12594096929be5280887479bb82db0a4b5686b962aa
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GksW:1nK6a+qdOOtEvwDpjW
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-