General
-
Target
2024-02-12_3f062d0ac36c9822b851dddf9d52979e_cryptolocker
-
Size
88KB
-
Sample
240212-er3elsab73
-
MD5
3f062d0ac36c9822b851dddf9d52979e
-
SHA1
be0f09a1b431d42d10e20409fd7f3698f3fb7b45
-
SHA256
76768dc797b14f1821c10e50dda85cbe2db01c19fe7e80b69930059ffe58d413
-
SHA512
a8fbe56076550b17011196ab05af8c785039ff7778ed79228b6cac3866cae90e28a2920d568d53732758fcf7595c402e80877ad94604a828ad568b3a44bd459c
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgkD:AnBdOOtEvwDpj6zS
Behavioral task
behavioral1
Sample
2024-02-12_3f062d0ac36c9822b851dddf9d52979e_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-02-12_3f062d0ac36c9822b851dddf9d52979e_cryptolocker.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-02-12_3f062d0ac36c9822b851dddf9d52979e_cryptolocker
-
Size
88KB
-
MD5
3f062d0ac36c9822b851dddf9d52979e
-
SHA1
be0f09a1b431d42d10e20409fd7f3698f3fb7b45
-
SHA256
76768dc797b14f1821c10e50dda85cbe2db01c19fe7e80b69930059ffe58d413
-
SHA512
a8fbe56076550b17011196ab05af8c785039ff7778ed79228b6cac3866cae90e28a2920d568d53732758fcf7595c402e80877ad94604a828ad568b3a44bd459c
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgkD:AnBdOOtEvwDpj6zS
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-