General
-
Target
2024-02-14_6669f808b3e258c8e6c508ae6cad8d6d_cryptolocker
-
Size
37KB
-
Sample
240214-t82lzagg59
-
MD5
6669f808b3e258c8e6c508ae6cad8d6d
-
SHA1
8f9a4a8679e314d42098fee1fea1932252b4488c
-
SHA256
c1a41405962f5d7887be6cde8d389e9f13a3442e00a50443a85fa2acec2b6a91
-
SHA512
519818d4bfce1db056701038c9fae806564d6fb2d0409853af91e05a3620ac09f62e2e9e1038a180250813a626c3fe2e5c62eb971fa9771bf908fb71658e19a0
-
SSDEEP
384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSznHzl6AJvDSuVDNN:b/yC4GyNM01GuQMNXw2PSjHPbSujN
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-14_6669f808b3e258c8e6c508ae6cad8d6d_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-14_6669f808b3e258c8e6c508ae6cad8d6d_cryptolocker.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-02-14_6669f808b3e258c8e6c508ae6cad8d6d_cryptolocker
-
Size
37KB
-
MD5
6669f808b3e258c8e6c508ae6cad8d6d
-
SHA1
8f9a4a8679e314d42098fee1fea1932252b4488c
-
SHA256
c1a41405962f5d7887be6cde8d389e9f13a3442e00a50443a85fa2acec2b6a91
-
SHA512
519818d4bfce1db056701038c9fae806564d6fb2d0409853af91e05a3620ac09f62e2e9e1038a180250813a626c3fe2e5c62eb971fa9771bf908fb71658e19a0
-
SSDEEP
384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSznHzl6AJvDSuVDNN:b/yC4GyNM01GuQMNXw2PSjHPbSujN
Score9/10-
Detection of CryptoLocker Variants
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-