General
-
Target
2024-02-12_39f4110b0e047b10cc0380553f8deb67_cryptolocker
-
Size
88KB
-
Sample
240212-f8ynesdf2v
-
MD5
39f4110b0e047b10cc0380553f8deb67
-
SHA1
8c1c66a71ad3ab2ae81ab140daf0451f5296b8d6
-
SHA256
8c0ed1c396c42d3a8f2786c63edb46a0921e9592f236320cf42a565f2f88e303
-
SHA512
c0224451ea6a7b64df78ebbbc48686a5d15b7db1cf1ebd639ab29c23ef7630d0e6066b11e60d450ebdd15b361fb09e8f963ee7a163d97eff7db7b6f88cd05820
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgdC:AnBdOOtEvwDpj6zw
Behavioral task
behavioral1
Sample
2024-02-12_39f4110b0e047b10cc0380553f8deb67_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-12_39f4110b0e047b10cc0380553f8deb67_cryptolocker.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-02-12_39f4110b0e047b10cc0380553f8deb67_cryptolocker
-
Size
88KB
-
MD5
39f4110b0e047b10cc0380553f8deb67
-
SHA1
8c1c66a71ad3ab2ae81ab140daf0451f5296b8d6
-
SHA256
8c0ed1c396c42d3a8f2786c63edb46a0921e9592f236320cf42a565f2f88e303
-
SHA512
c0224451ea6a7b64df78ebbbc48686a5d15b7db1cf1ebd639ab29c23ef7630d0e6066b11e60d450ebdd15b361fb09e8f963ee7a163d97eff7db7b6f88cd05820
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgdC:AnBdOOtEvwDpj6zw
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-