General
-
Target
2024-02-14_df4b88cf48d15f12d2b255984aa74dba_cryptolocker
-
Size
80KB
-
Sample
240214-p2gwrsah21
-
MD5
df4b88cf48d15f12d2b255984aa74dba
-
SHA1
6f50353ce0b2b661d370af76ce50eb449e3ddb56
-
SHA256
d2f65a01cf785a91e2bbb2be4b1726897a8a43e0fe97f8144e2f385cb1de61f7
-
SHA512
8e1f16b94462a626c78299a9d83f14ce308ea0f4633c25aa0eb12cf5dc9956637c8b080ea033d5b37b28a0b0f0b2962397b1de3e63dcf1ca64894b3702f66e94
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBd03:T6a+rdOOtEvwDpjNto
Behavioral task
behavioral1
Sample
2024-02-14_df4b88cf48d15f12d2b255984aa74dba_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-14_df4b88cf48d15f12d2b255984aa74dba_cryptolocker.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-02-14_df4b88cf48d15f12d2b255984aa74dba_cryptolocker
-
Size
80KB
-
MD5
df4b88cf48d15f12d2b255984aa74dba
-
SHA1
6f50353ce0b2b661d370af76ce50eb449e3ddb56
-
SHA256
d2f65a01cf785a91e2bbb2be4b1726897a8a43e0fe97f8144e2f385cb1de61f7
-
SHA512
8e1f16b94462a626c78299a9d83f14ce308ea0f4633c25aa0eb12cf5dc9956637c8b080ea033d5b37b28a0b0f0b2962397b1de3e63dcf1ca64894b3702f66e94
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBd03:T6a+rdOOtEvwDpjNto
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-