General
-
Target
2024-02-12_c305ee08c2c75c67aa3e146413119198_cryptolocker
-
Size
126KB
-
Sample
240212-x5qbbacg84
-
MD5
c305ee08c2c75c67aa3e146413119198
-
SHA1
245841bdb458d6006b9fe8eacdabd49c43b8939b
-
SHA256
8cac72bb4dfef748bd481de89cb32e8de1e57c5ff0994e65cad77659e53e2ecd
-
SHA512
66b16806b39213b1a5d34e90fb9940ff954ba235a87c482cebbec7af7089c9e0f70d16e54c08448becd09cf83b26a664bd431e736c05fce25ddacd2d8e15557b
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1eInY:AnBdOOtEvwDpj6zV
Behavioral task
behavioral1
Sample
2024-02-12_c305ee08c2c75c67aa3e146413119198_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-12_c305ee08c2c75c67aa3e146413119198_cryptolocker.exe
Resource
win10v2004-20231222-en
Malware Config
Targets
-
-
Target
2024-02-12_c305ee08c2c75c67aa3e146413119198_cryptolocker
-
Size
126KB
-
MD5
c305ee08c2c75c67aa3e146413119198
-
SHA1
245841bdb458d6006b9fe8eacdabd49c43b8939b
-
SHA256
8cac72bb4dfef748bd481de89cb32e8de1e57c5ff0994e65cad77659e53e2ecd
-
SHA512
66b16806b39213b1a5d34e90fb9940ff954ba235a87c482cebbec7af7089c9e0f70d16e54c08448becd09cf83b26a664bd431e736c05fce25ddacd2d8e15557b
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1eInY:AnBdOOtEvwDpj6zV
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-