General
-
Target
2024-02-12_bb53ee4d545beb6e607e6e0de66238d3_cryptolocker
-
Size
126KB
-
Sample
240212-x5gn6sbb4y
-
MD5
bb53ee4d545beb6e607e6e0de66238d3
-
SHA1
1e30a74eb97ea8ea4295a66eb7feea0d882cc671
-
SHA256
b0b6de6ae5525bb4f817573e9733a15e438021c0812334c80607ae9332c71d54
-
SHA512
d236119efe258c76087128fa8efc945170fea9f5a034935e865778e20f51708f8575652ab1d9ef4bbd3f835d32d2764ac7317a7ea538bc491ba08ef9f28cf149
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1eInp:AnBdOOtEvwDpj6zc
Behavioral task
behavioral1
Sample
2024-02-12_bb53ee4d545beb6e607e6e0de66238d3_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-12_bb53ee4d545beb6e607e6e0de66238d3_cryptolocker.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-02-12_bb53ee4d545beb6e607e6e0de66238d3_cryptolocker
-
Size
126KB
-
MD5
bb53ee4d545beb6e607e6e0de66238d3
-
SHA1
1e30a74eb97ea8ea4295a66eb7feea0d882cc671
-
SHA256
b0b6de6ae5525bb4f817573e9733a15e438021c0812334c80607ae9332c71d54
-
SHA512
d236119efe258c76087128fa8efc945170fea9f5a034935e865778e20f51708f8575652ab1d9ef4bbd3f835d32d2764ac7317a7ea538bc491ba08ef9f28cf149
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1eInp:AnBdOOtEvwDpj6zc
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-