General
-
Target
2024-02-12_3f21117a15f199a3e13062bd7d3f01e2_cryptolocker
-
Size
63KB
-
Sample
240212-x3xydabb3w
-
MD5
3f21117a15f199a3e13062bd7d3f01e2
-
SHA1
d5701e7ebaa747739c8aff2a73d966d33364a8e9
-
SHA256
311d89e6bdd910da6d9d79fd3b6dc0b4aa6ec85286d6159ca4ad1f99c56a1163
-
SHA512
8ef748853cc5be12df7f2219d35c053319635e30822782f917d9fdfa7c6b2ad1d0dce87ac045feb536d4721fe45625ca1b535a9c9abea97dfcc7395e69beaff4
-
SSDEEP
768:T6LsoEEeegiZPvEhHSG+gkum/kLyMro2GtOOtEvwDpjhXMLamkc8J5hRXq/:T6QFElP6n+gxmddpMOtEvwDpjwa3nS
Behavioral task
behavioral1
Sample
2024-02-12_3f21117a15f199a3e13062bd7d3f01e2_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-12_3f21117a15f199a3e13062bd7d3f01e2_cryptolocker.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-02-12_3f21117a15f199a3e13062bd7d3f01e2_cryptolocker
-
Size
63KB
-
MD5
3f21117a15f199a3e13062bd7d3f01e2
-
SHA1
d5701e7ebaa747739c8aff2a73d966d33364a8e9
-
SHA256
311d89e6bdd910da6d9d79fd3b6dc0b4aa6ec85286d6159ca4ad1f99c56a1163
-
SHA512
8ef748853cc5be12df7f2219d35c053319635e30822782f917d9fdfa7c6b2ad1d0dce87ac045feb536d4721fe45625ca1b535a9c9abea97dfcc7395e69beaff4
-
SSDEEP
768:T6LsoEEeegiZPvEhHSG+gkum/kLyMro2GtOOtEvwDpjhXMLamkc8J5hRXq/:T6QFElP6n+gxmddpMOtEvwDpjwa3nS
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-