General
-
Target
2024-02-13_9aaf3697ee3cb40d0f3fef26c2943813_cryptolocker
-
Size
101KB
-
Sample
240213-gxd1bacd42
-
MD5
9aaf3697ee3cb40d0f3fef26c2943813
-
SHA1
71c017c1bbfdaf158226ebb2a613e061c5b0bbab
-
SHA256
42b939ce56556135bc4e3af9d2d0d97bc2b666208ffc68793548a6f241d85bf1
-
SHA512
2a8aa4f0f0c4cb689d0983cf5528811adfcdb94a719ac442e9a273360f91d8fa80d14578820279dfcad92f93d60a997e4f922f721d4edd6cec7c0941fc78dbee
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpwqWsviy6ixHq:AnBdOOtEvwDpj6zl
Behavioral task
behavioral1
Sample
2024-02-13_9aaf3697ee3cb40d0f3fef26c2943813_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-13_9aaf3697ee3cb40d0f3fef26c2943813_cryptolocker.exe
Resource
win10v2004-20231222-en
Malware Config
Targets
-
-
Target
2024-02-13_9aaf3697ee3cb40d0f3fef26c2943813_cryptolocker
-
Size
101KB
-
MD5
9aaf3697ee3cb40d0f3fef26c2943813
-
SHA1
71c017c1bbfdaf158226ebb2a613e061c5b0bbab
-
SHA256
42b939ce56556135bc4e3af9d2d0d97bc2b666208ffc68793548a6f241d85bf1
-
SHA512
2a8aa4f0f0c4cb689d0983cf5528811adfcdb94a719ac442e9a273360f91d8fa80d14578820279dfcad92f93d60a997e4f922f721d4edd6cec7c0941fc78dbee
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpwqWsviy6ixHq:AnBdOOtEvwDpj6zl
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-