General
-
Target
2024-02-14_e1bc11e44429fc018df236c380df4f91_cryptolocker
-
Size
34KB
-
Sample
240214-sc86haeg93
-
MD5
e1bc11e44429fc018df236c380df4f91
-
SHA1
5a70e777388bc7c6f8e1a2f46fa08f00bbfd4c4d
-
SHA256
bf743ebd98b5d87727babc4d4d8490f7d95071865eebd1e6e8818af6a1add540
-
SHA512
541fb6aa8de91e92fc1a21c2e99de6545f6950199bb628e36727253f5c207d99c95b135868880ef7cf8f90c0fd00b05594a01ba12719c12b0a6001c3fb3e42fd
-
SSDEEP
768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoWDS:qmbhXDmjr5MOtEvwDpj5cDJ
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-14_e1bc11e44429fc018df236c380df4f91_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-14_e1bc11e44429fc018df236c380df4f91_cryptolocker.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-02-14_e1bc11e44429fc018df236c380df4f91_cryptolocker
-
Size
34KB
-
MD5
e1bc11e44429fc018df236c380df4f91
-
SHA1
5a70e777388bc7c6f8e1a2f46fa08f00bbfd4c4d
-
SHA256
bf743ebd98b5d87727babc4d4d8490f7d95071865eebd1e6e8818af6a1add540
-
SHA512
541fb6aa8de91e92fc1a21c2e99de6545f6950199bb628e36727253f5c207d99c95b135868880ef7cf8f90c0fd00b05594a01ba12719c12b0a6001c3fb3e42fd
-
SSDEEP
768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoWDS:qmbhXDmjr5MOtEvwDpj5cDJ
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-