General
-
Target
2024-02-14_a0cd079923e6b6ec098f88dd42fcc2c4_cryptolocker
-
Size
105KB
-
Sample
240214-eqlepsgf5z
-
MD5
a0cd079923e6b6ec098f88dd42fcc2c4
-
SHA1
df53449cc59b18035280d58fa95115046d382a40
-
SHA256
e05d200d6e0e685b820acf8c60aa1c6b198244dceca3d27875c2328c7e9fd983
-
SHA512
d06809c9a8c67676243f9b9d27d8340358a98ab569ed1eed96abe7d2ba4e6a12c878844c000afd813ed07d9fdb98b5e87bce0e54695094ee3785f0723f640568
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GksM:1nK6a+qdOOtEvwDpjM
Behavioral task
behavioral1
Sample
2024-02-14_a0cd079923e6b6ec098f88dd42fcc2c4_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-14_a0cd079923e6b6ec098f88dd42fcc2c4_cryptolocker.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-02-14_a0cd079923e6b6ec098f88dd42fcc2c4_cryptolocker
-
Size
105KB
-
MD5
a0cd079923e6b6ec098f88dd42fcc2c4
-
SHA1
df53449cc59b18035280d58fa95115046d382a40
-
SHA256
e05d200d6e0e685b820acf8c60aa1c6b198244dceca3d27875c2328c7e9fd983
-
SHA512
d06809c9a8c67676243f9b9d27d8340358a98ab569ed1eed96abe7d2ba4e6a12c878844c000afd813ed07d9fdb98b5e87bce0e54695094ee3785f0723f640568
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GksM:1nK6a+qdOOtEvwDpjM
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-