General
-
Target
2024-02-14_0687fc86768e9fe55e62c82a45b349d1_cryptolocker
-
Size
88KB
-
Sample
240214-kabs8adf4z
-
MD5
0687fc86768e9fe55e62c82a45b349d1
-
SHA1
9d9523869d471bc75bc6c8f92d17039d4ee569e2
-
SHA256
cca6457b708a2e390f7aaaedf17774b5894922cebacbb12defc8d080acb12e1f
-
SHA512
b1702605fc0707fbffaa951bba551cb4c7b8dadaa358cb7225028365d9a3f0b8dbcefa7e587415f2e613cbeaae906164526f5bb453c9f6ca0eda768d1dcc5d9f
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgdP1:AnBdOOtEvwDpj6zL
Behavioral task
behavioral1
Sample
2024-02-14_0687fc86768e9fe55e62c82a45b349d1_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-14_0687fc86768e9fe55e62c82a45b349d1_cryptolocker.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-02-14_0687fc86768e9fe55e62c82a45b349d1_cryptolocker
-
Size
88KB
-
MD5
0687fc86768e9fe55e62c82a45b349d1
-
SHA1
9d9523869d471bc75bc6c8f92d17039d4ee569e2
-
SHA256
cca6457b708a2e390f7aaaedf17774b5894922cebacbb12defc8d080acb12e1f
-
SHA512
b1702605fc0707fbffaa951bba551cb4c7b8dadaa358cb7225028365d9a3f0b8dbcefa7e587415f2e613cbeaae906164526f5bb453c9f6ca0eda768d1dcc5d9f
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgdP1:AnBdOOtEvwDpj6zL
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-