General
-
Target
2024-02-13_7ca1066715d2e68cab4a2fcdada52949_cryptolocker
-
Size
95KB
-
Sample
240213-jrmflsch21
-
MD5
7ca1066715d2e68cab4a2fcdada52949
-
SHA1
fd578463c375824cd59b17f0eb77c9cb437507db
-
SHA256
f4c9774fbb6e3d77a45641135df20c1e1277c618a08adab63881fb648e4a593e
-
SHA512
da185f72d8f65865d4383e2e1dc8f23e525052bef8f68d6a32558b329d2d934be644b8755497a8177dacdfe2c1b745fdcab2f51fde7735f3c7fef8072090d0bb
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp015Q:AnBdOOtEvwDpj6zc
Behavioral task
behavioral1
Sample
2024-02-13_7ca1066715d2e68cab4a2fcdada52949_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-13_7ca1066715d2e68cab4a2fcdada52949_cryptolocker.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-02-13_7ca1066715d2e68cab4a2fcdada52949_cryptolocker
-
Size
95KB
-
MD5
7ca1066715d2e68cab4a2fcdada52949
-
SHA1
fd578463c375824cd59b17f0eb77c9cb437507db
-
SHA256
f4c9774fbb6e3d77a45641135df20c1e1277c618a08adab63881fb648e4a593e
-
SHA512
da185f72d8f65865d4383e2e1dc8f23e525052bef8f68d6a32558b329d2d934be644b8755497a8177dacdfe2c1b745fdcab2f51fde7735f3c7fef8072090d0bb
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp015Q:AnBdOOtEvwDpj6zc
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-