General
-
Target
2024-02-11_a54a2b309213817f947e9c19202542b5_cryptolocker
-
Size
97KB
-
Sample
240211-1k14vsbg8t
-
MD5
a54a2b309213817f947e9c19202542b5
-
SHA1
ed216c84cdd008c689c40498d746539c74de2325
-
SHA256
a98be8b0d8f868692458f40fac5085f5cdae87bf380fd22705bb9981d06c2038
-
SHA512
7ba3073036a3fe4dcd92b77641592104af11551a4f5db1951e2b8a0b4102a9c5337837c79bd6548fb67c1f5327d53e01d2524a6a2c886ca9a698014e8687d712
-
SSDEEP
1536:26QFElP6n+gBQMOtEvwDpjQGYQbN/PKwNCJAw:26a+2OtEvwDpjtzg
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-11_a54a2b309213817f947e9c19202542b5_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-02-11_a54a2b309213817f947e9c19202542b5_cryptolocker.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-02-11_a54a2b309213817f947e9c19202542b5_cryptolocker
-
Size
97KB
-
MD5
a54a2b309213817f947e9c19202542b5
-
SHA1
ed216c84cdd008c689c40498d746539c74de2325
-
SHA256
a98be8b0d8f868692458f40fac5085f5cdae87bf380fd22705bb9981d06c2038
-
SHA512
7ba3073036a3fe4dcd92b77641592104af11551a4f5db1951e2b8a0b4102a9c5337837c79bd6548fb67c1f5327d53e01d2524a6a2c886ca9a698014e8687d712
-
SSDEEP
1536:26QFElP6n+gBQMOtEvwDpjQGYQbN/PKwNCJAw:26a+2OtEvwDpjtzg
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-