General
-
Target
2024-02-12_50d6052c02d7ef5cb3223adf4e23998f_cryptolocker
-
Size
34KB
-
Sample
240212-y72mssdc95
-
MD5
50d6052c02d7ef5cb3223adf4e23998f
-
SHA1
1ba5e08f25b901446dab65c1cc0dceed0415b1c6
-
SHA256
d238f7bd07e11ff746f55e6d1f397346a88dabea94819910921e0834ea662bc1
-
SHA512
7b589514147eb021ada54741370595e28c19853883c2b738fe6a371ce107fdc27df34197e0306ddcfaf0702c95f581d5e9ad52351465cab6ed5adae015296f9d
-
SSDEEP
384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSznHzu02lOQAYn:b/yC4GyNM01GuQMNXw2PSjHC02ltAYn
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-12_50d6052c02d7ef5cb3223adf4e23998f_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-12_50d6052c02d7ef5cb3223adf4e23998f_cryptolocker.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-02-12_50d6052c02d7ef5cb3223adf4e23998f_cryptolocker
-
Size
34KB
-
MD5
50d6052c02d7ef5cb3223adf4e23998f
-
SHA1
1ba5e08f25b901446dab65c1cc0dceed0415b1c6
-
SHA256
d238f7bd07e11ff746f55e6d1f397346a88dabea94819910921e0834ea662bc1
-
SHA512
7b589514147eb021ada54741370595e28c19853883c2b738fe6a371ce107fdc27df34197e0306ddcfaf0702c95f581d5e9ad52351465cab6ed5adae015296f9d
-
SSDEEP
384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSznHzu02lOQAYn:b/yC4GyNM01GuQMNXw2PSjHC02ltAYn
Score9/10-
Detection of CryptoLocker Variants
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-