General
-
Target
2024-02-04_3dd5d1cac7c05313513c9f87a6da1360_cryptolocker
-
Size
64KB
-
Sample
240204-x53xeabahk
-
MD5
3dd5d1cac7c05313513c9f87a6da1360
-
SHA1
d133a313163383db58b680b9a92700573801058d
-
SHA256
4130b86f2a091273261b0e96dc6d3a48ab589660dee3aee73f96068f6d7ade9e
-
SHA512
619e844e5bfb3651533471bf438c3411bb59c99e539cea72d9c2ea640ff651890ecde51109d5f6066991617b86496a0b5c7bc22c119d20915d3103274ce5c20c
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUa1Fr:T6a+rdOOtEvwDpjNL
Behavioral task
behavioral1
Sample
2024-02-04_3dd5d1cac7c05313513c9f87a6da1360_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-04_3dd5d1cac7c05313513c9f87a6da1360_cryptolocker.exe
Resource
win10v2004-20231222-en
Malware Config
Targets
-
-
Target
2024-02-04_3dd5d1cac7c05313513c9f87a6da1360_cryptolocker
-
Size
64KB
-
MD5
3dd5d1cac7c05313513c9f87a6da1360
-
SHA1
d133a313163383db58b680b9a92700573801058d
-
SHA256
4130b86f2a091273261b0e96dc6d3a48ab589660dee3aee73f96068f6d7ade9e
-
SHA512
619e844e5bfb3651533471bf438c3411bb59c99e539cea72d9c2ea640ff651890ecde51109d5f6066991617b86496a0b5c7bc22c119d20915d3103274ce5c20c
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUa1Fr:T6a+rdOOtEvwDpjNL
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-