General
-
Target
2024-02-12_9e104fdc42e80948f855d7985660be4f_cryptolocker
-
Size
33KB
-
Sample
240212-gm684sfh96
-
MD5
9e104fdc42e80948f855d7985660be4f
-
SHA1
f49ba74a25f23357fa90f6afdd51e60dd9c2c897
-
SHA256
6690dd2eb4f3a3bedf7e71b71f1d633f12c63ff4f7d648cfa00e564aac9c5a02
-
SHA512
db8c51fc28ed19e1fedb5ab5ce5aecec3ecf0b854ebbdee798cfeaae7713e4081ed805a6454f8519c52a5ae38bb2b4c62c89410c936ddd2b329059182b4947fb
-
SSDEEP
768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLam5axW:qUmnpomddpMOtEvwDpjjaYas
Behavioral task
behavioral1
Sample
2024-02-12_9e104fdc42e80948f855d7985660be4f_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-12_9e104fdc42e80948f855d7985660be4f_cryptolocker.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-02-12_9e104fdc42e80948f855d7985660be4f_cryptolocker
-
Size
33KB
-
MD5
9e104fdc42e80948f855d7985660be4f
-
SHA1
f49ba74a25f23357fa90f6afdd51e60dd9c2c897
-
SHA256
6690dd2eb4f3a3bedf7e71b71f1d633f12c63ff4f7d648cfa00e564aac9c5a02
-
SHA512
db8c51fc28ed19e1fedb5ab5ce5aecec3ecf0b854ebbdee798cfeaae7713e4081ed805a6454f8519c52a5ae38bb2b4c62c89410c936ddd2b329059182b4947fb
-
SSDEEP
768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLam5axW:qUmnpomddpMOtEvwDpjjaYas
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-