General
-
Target
2024-02-13_14d6d01d77ab761e12a271fe74cf8f5d_cryptolocker
-
Size
126KB
-
Sample
240213-d6fnqagd9x
-
MD5
14d6d01d77ab761e12a271fe74cf8f5d
-
SHA1
a36a3552a55a48fb4ee9d41fe8d26a92ecf85a44
-
SHA256
7e6a00f6b87824b5654d742943c30eb28e8c764a6a9f34e0d71d7b8c5d3be732
-
SHA512
370ffa21b29ebbddf0d5a5de7e66f851cd1461415b3f75318a81c15c142f6801271ab3eb6446776bc12901550f9d0a12378526268cfcaf9f832e7da9286b82fc
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1eIn2j:AnBdOOtEvwDpj6z9
Behavioral task
behavioral1
Sample
2024-02-13_14d6d01d77ab761e12a271fe74cf8f5d_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-13_14d6d01d77ab761e12a271fe74cf8f5d_cryptolocker.exe
Resource
win10v2004-20231222-en
Malware Config
Targets
-
-
Target
2024-02-13_14d6d01d77ab761e12a271fe74cf8f5d_cryptolocker
-
Size
126KB
-
MD5
14d6d01d77ab761e12a271fe74cf8f5d
-
SHA1
a36a3552a55a48fb4ee9d41fe8d26a92ecf85a44
-
SHA256
7e6a00f6b87824b5654d742943c30eb28e8c764a6a9f34e0d71d7b8c5d3be732
-
SHA512
370ffa21b29ebbddf0d5a5de7e66f851cd1461415b3f75318a81c15c142f6801271ab3eb6446776bc12901550f9d0a12378526268cfcaf9f832e7da9286b82fc
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1eIn2j:AnBdOOtEvwDpj6z9
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-