General
-
Target
2024-02-11_fa91802a1689632a4730f19df3480259_cryptolocker
-
Size
82KB
-
Sample
240211-s7tdjahe3v
-
MD5
fa91802a1689632a4730f19df3480259
-
SHA1
7d6513c6cf734abdce338ba9cc2f6ae2e470f862
-
SHA256
24cdeffa74149ef777a5472e98ec151b094cc746e963171c687dece4d81b3465
-
SHA512
70d5d4a17c6cfe7067ebbdb4bd3dc6b702b9bcd80d79b595a9765793f836aa0cbecaf2b69a35f47bf973f144389353effe87ec17a347492c1d7891334e2042b2
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyJS1cd:zCsanOtEvwDpj8
Behavioral task
behavioral1
Sample
2024-02-11_fa91802a1689632a4730f19df3480259_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-11_fa91802a1689632a4730f19df3480259_cryptolocker.exe
Resource
win10v2004-20231222-en
Malware Config
Targets
-
-
Target
2024-02-11_fa91802a1689632a4730f19df3480259_cryptolocker
-
Size
82KB
-
MD5
fa91802a1689632a4730f19df3480259
-
SHA1
7d6513c6cf734abdce338ba9cc2f6ae2e470f862
-
SHA256
24cdeffa74149ef777a5472e98ec151b094cc746e963171c687dece4d81b3465
-
SHA512
70d5d4a17c6cfe7067ebbdb4bd3dc6b702b9bcd80d79b595a9765793f836aa0cbecaf2b69a35f47bf973f144389353effe87ec17a347492c1d7891334e2042b2
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyJS1cd:zCsanOtEvwDpj8
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-