General
-
Target
2024-02-12_e3f86faf8669d385b7b79d26470e42ab_cryptolocker
-
Size
81KB
-
Sample
240212-y7j3rabf2y
-
MD5
e3f86faf8669d385b7b79d26470e42ab
-
SHA1
ad57ed1d73de7cdce29bebe868cebd9a8f95f99f
-
SHA256
3c38dcaee834af4375b24cbfc5b4de398f7d64f211ee2be41a9c30dadbd1f983
-
SHA512
2d1f2e960bfadde82c37e5bf49b79054ee32f4002aaa0af039f0ddceb39024b9e831fa40c489b88e7563ef6b4cadcaa221e1513d03c0c80209cda1d4933bd944
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky2fm:zCsanOtEvwDpjo
Behavioral task
behavioral1
Sample
2024-02-12_e3f86faf8669d385b7b79d26470e42ab_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-12_e3f86faf8669d385b7b79d26470e42ab_cryptolocker.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-02-12_e3f86faf8669d385b7b79d26470e42ab_cryptolocker
-
Size
81KB
-
MD5
e3f86faf8669d385b7b79d26470e42ab
-
SHA1
ad57ed1d73de7cdce29bebe868cebd9a8f95f99f
-
SHA256
3c38dcaee834af4375b24cbfc5b4de398f7d64f211ee2be41a9c30dadbd1f983
-
SHA512
2d1f2e960bfadde82c37e5bf49b79054ee32f4002aaa0af039f0ddceb39024b9e831fa40c489b88e7563ef6b4cadcaa221e1513d03c0c80209cda1d4933bd944
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky2fm:zCsanOtEvwDpjo
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-