General
-
Target
2024-02-12_c26ac7ed16a16a37da5b95ae01413d43_cryptolocker
-
Size
30KB
-
Sample
240212-wd693scd34
-
MD5
c26ac7ed16a16a37da5b95ae01413d43
-
SHA1
c752559f896eccfeba95f09a1cdac14cdb70360f
-
SHA256
f476d333754a58c4a70a0b521d8c0e64a3a61f444aae5598a871a38c51f44ffb
-
SHA512
8e135f9cc72b7a81ba71671dc77a5df3b1706aead09d1662534fda17ae3dbb4636d8f38047d91c11fbca9fac0dc265ad619412bb34ebeb73257564ae43db2e22
-
SSDEEP
384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSzn8YS:b/yC4GyNM01GuQMNXw2PSjW
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-12_c26ac7ed16a16a37da5b95ae01413d43_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-12_c26ac7ed16a16a37da5b95ae01413d43_cryptolocker.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-02-12_c26ac7ed16a16a37da5b95ae01413d43_cryptolocker
-
Size
30KB
-
MD5
c26ac7ed16a16a37da5b95ae01413d43
-
SHA1
c752559f896eccfeba95f09a1cdac14cdb70360f
-
SHA256
f476d333754a58c4a70a0b521d8c0e64a3a61f444aae5598a871a38c51f44ffb
-
SHA512
8e135f9cc72b7a81ba71671dc77a5df3b1706aead09d1662534fda17ae3dbb4636d8f38047d91c11fbca9fac0dc265ad619412bb34ebeb73257564ae43db2e22
-
SSDEEP
384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSzn8YS:b/yC4GyNM01GuQMNXw2PSjW
Score9/10-
Detection of CryptoLocker Variants
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-