General
-
Target
2024-02-14_ee2615295b23cdefa846e55ac14f9621_cryptolocker
-
Size
88KB
-
Sample
240214-cpq8fsed8y
-
MD5
ee2615295b23cdefa846e55ac14f9621
-
SHA1
81d3e4351609768572317b776101d7cb7ee11080
-
SHA256
c2df9a2aecd8dc1b8686022d5e7907540653715812ab5cefb18dbd0ed3c4eb44
-
SHA512
934ccd472af0fe93e9b7d861b103da7583c24af21a391233a517725f7034b80057f001d9fc0290264f07201f3737b701043cebb49dac50f3865378ed8f89e463
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgdu:AnBdOOtEvwDpj6zE
Behavioral task
behavioral1
Sample
2024-02-14_ee2615295b23cdefa846e55ac14f9621_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-14_ee2615295b23cdefa846e55ac14f9621_cryptolocker.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-02-14_ee2615295b23cdefa846e55ac14f9621_cryptolocker
-
Size
88KB
-
MD5
ee2615295b23cdefa846e55ac14f9621
-
SHA1
81d3e4351609768572317b776101d7cb7ee11080
-
SHA256
c2df9a2aecd8dc1b8686022d5e7907540653715812ab5cefb18dbd0ed3c4eb44
-
SHA512
934ccd472af0fe93e9b7d861b103da7583c24af21a391233a517725f7034b80057f001d9fc0290264f07201f3737b701043cebb49dac50f3865378ed8f89e463
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgdu:AnBdOOtEvwDpj6zE
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-