General
-
Target
2024-02-14_ce8d7530325639e9d59cd2239924bfa3_cryptolocker
-
Size
125KB
-
Sample
240214-exmaksaa68
-
MD5
ce8d7530325639e9d59cd2239924bfa3
-
SHA1
a546329c74e69997bf071dd9fe6f4b72196054b1
-
SHA256
dc5ab421e5737a8231be1977af5fb89fbf506460c305802a46cebfee226ec1fc
-
SHA512
8d973057dfd45aa1d1f381e162c422de281e25991d6686cf86f7442a1810cc148c2c8cb831798a56f36176c4ea5f294751419c7b039f51acd4e7117c68eb67ee
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1eI5:AnBdOOtEvwDpj6zE
Behavioral task
behavioral1
Sample
2024-02-14_ce8d7530325639e9d59cd2239924bfa3_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-14_ce8d7530325639e9d59cd2239924bfa3_cryptolocker.exe
Resource
win10v2004-20231222-en
Malware Config
Targets
-
-
Target
2024-02-14_ce8d7530325639e9d59cd2239924bfa3_cryptolocker
-
Size
125KB
-
MD5
ce8d7530325639e9d59cd2239924bfa3
-
SHA1
a546329c74e69997bf071dd9fe6f4b72196054b1
-
SHA256
dc5ab421e5737a8231be1977af5fb89fbf506460c305802a46cebfee226ec1fc
-
SHA512
8d973057dfd45aa1d1f381e162c422de281e25991d6686cf86f7442a1810cc148c2c8cb831798a56f36176c4ea5f294751419c7b039f51acd4e7117c68eb67ee
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1eI5:AnBdOOtEvwDpj6zE
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-