General
-
Target
2024-02-11_4f2fd128daa71166ed5a0f5bd01a9e57_cryptolocker
-
Size
39KB
-
Sample
240211-pmv5vaga4z
-
MD5
4f2fd128daa71166ed5a0f5bd01a9e57
-
SHA1
38e42ade6e3e66ecf56cd39e06898563c93ace64
-
SHA256
4df16c1db9f9d62c0b8c9b911cfcdf019f4e7b8591333ece1fbe422535b28b37
-
SHA512
10d432c103c1e3002cb08a8c5e885026ba1f809563e7e1292018bcb2bb0b43f3d757efd5a2de8b7fcaeb75a2008237362a585d5e0de7a914304db6a2f7bad018
-
SSDEEP
768:TS5nQJ24LR7tOOtEvwDpjGqPhqlcnvgpnHRR:m5nkFNMOtEvwDpjG8hgpHRR
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-11_4f2fd128daa71166ed5a0f5bd01a9e57_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-11_4f2fd128daa71166ed5a0f5bd01a9e57_cryptolocker.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-02-11_4f2fd128daa71166ed5a0f5bd01a9e57_cryptolocker
-
Size
39KB
-
MD5
4f2fd128daa71166ed5a0f5bd01a9e57
-
SHA1
38e42ade6e3e66ecf56cd39e06898563c93ace64
-
SHA256
4df16c1db9f9d62c0b8c9b911cfcdf019f4e7b8591333ece1fbe422535b28b37
-
SHA512
10d432c103c1e3002cb08a8c5e885026ba1f809563e7e1292018bcb2bb0b43f3d757efd5a2de8b7fcaeb75a2008237362a585d5e0de7a914304db6a2f7bad018
-
SSDEEP
768:TS5nQJ24LR7tOOtEvwDpjGqPhqlcnvgpnHRR:m5nkFNMOtEvwDpjG8hgpHRR
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
Detects executables built or packed with MPress PE compressor
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-