General
-
Target
2024-02-14_c2cc48b08bc6923131b5cc86e039462e_cryptolocker
-
Size
60KB
-
Sample
240214-dgy4rsfc4x
-
MD5
c2cc48b08bc6923131b5cc86e039462e
-
SHA1
df728aabf8945235f689f18523f39e53547e2086
-
SHA256
a06c13c29ea2a5efe9f54866fb450bddaea336ec6b347156111cac61f7c5fc1a
-
SHA512
f0072f22242bfa160798e9397450c9e8b6fc421197d75cfccd3afb63f9318f341898fc70368eea6e40403e7f3913c83860310466eb3778ed7122558ee47f62ab
-
SSDEEP
1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtskPD:BbdDmjr+OtEvwDpjM8W
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-14_c2cc48b08bc6923131b5cc86e039462e_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-14_c2cc48b08bc6923131b5cc86e039462e_cryptolocker.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-02-14_c2cc48b08bc6923131b5cc86e039462e_cryptolocker
-
Size
60KB
-
MD5
c2cc48b08bc6923131b5cc86e039462e
-
SHA1
df728aabf8945235f689f18523f39e53547e2086
-
SHA256
a06c13c29ea2a5efe9f54866fb450bddaea336ec6b347156111cac61f7c5fc1a
-
SHA512
f0072f22242bfa160798e9397450c9e8b6fc421197d75cfccd3afb63f9318f341898fc70368eea6e40403e7f3913c83860310466eb3778ed7122558ee47f62ab
-
SSDEEP
1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtskPD:BbdDmjr+OtEvwDpjM8W
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-