General
-
Target
2024-02-13_51b3265e867aabfc86879207764de605_cryptolocker
-
Size
80KB
-
Sample
240213-rwqb3ada99
-
MD5
51b3265e867aabfc86879207764de605
-
SHA1
a2ebfe9abd11cec47912b4f884fa76659f0900b4
-
SHA256
c9b5c76379f0dc9af134afe38a678d1f6d2ace53a579e06178e636aef2a19ab0
-
SHA512
44664bd748389bb56dde9bddf8d6ce13f713227e2e15de8f26e27f4fb2ec2903e9f871175bc1282239eb051f3b07972384a343b83239e09ca6e540b7e42e2996
-
SSDEEP
1536:Tj+jsMQMOtEvwDpj5HmpJpOUHECgNMo0vp2EMMu:TCjsIOtEvwDpj5HE/OUHnSM8
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-13_51b3265e867aabfc86879207764de605_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-02-13_51b3265e867aabfc86879207764de605_cryptolocker.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-02-13_51b3265e867aabfc86879207764de605_cryptolocker
-
Size
80KB
-
MD5
51b3265e867aabfc86879207764de605
-
SHA1
a2ebfe9abd11cec47912b4f884fa76659f0900b4
-
SHA256
c9b5c76379f0dc9af134afe38a678d1f6d2ace53a579e06178e636aef2a19ab0
-
SHA512
44664bd748389bb56dde9bddf8d6ce13f713227e2e15de8f26e27f4fb2ec2903e9f871175bc1282239eb051f3b07972384a343b83239e09ca6e540b7e42e2996
-
SSDEEP
1536:Tj+jsMQMOtEvwDpj5HmpJpOUHECgNMo0vp2EMMu:TCjsIOtEvwDpj5HE/OUHnSM8
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-