General
-
Target
2024-02-13_dfc68a4422144377f4a7e8dab62aef32_cryptolocker
-
Size
80KB
-
Sample
240213-r96wzacc2w
-
MD5
dfc68a4422144377f4a7e8dab62aef32
-
SHA1
e52f5fcd63471fd930d5999cc62505fb17dd8b69
-
SHA256
efa9a28bda455561043ccddca4fe61d76b4f2dc14d2e2cae7ef96957b8df7d57
-
SHA512
f467998cae25617f6f440182d29dc7fd29e47f29f686ff3772ea5b84ae37dbbd0968bd723c4af9ae86655d823a761b92f4e17873a15fc5143140f0df1917b734
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBd0nJ:T6a+rdOOtEvwDpjNtK
Behavioral task
behavioral1
Sample
2024-02-13_dfc68a4422144377f4a7e8dab62aef32_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-13_dfc68a4422144377f4a7e8dab62aef32_cryptolocker.exe
Resource
win10v2004-20231222-en
Malware Config
Targets
-
-
Target
2024-02-13_dfc68a4422144377f4a7e8dab62aef32_cryptolocker
-
Size
80KB
-
MD5
dfc68a4422144377f4a7e8dab62aef32
-
SHA1
e52f5fcd63471fd930d5999cc62505fb17dd8b69
-
SHA256
efa9a28bda455561043ccddca4fe61d76b4f2dc14d2e2cae7ef96957b8df7d57
-
SHA512
f467998cae25617f6f440182d29dc7fd29e47f29f686ff3772ea5b84ae37dbbd0968bd723c4af9ae86655d823a761b92f4e17873a15fc5143140f0df1917b734
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBd0nJ:T6a+rdOOtEvwDpjNtK
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-