General
-
Target
2024-02-14_7f8b8c560029a21fbadf084a25f50e36_cryptolocker
-
Size
116KB
-
Sample
240214-vmsmlshc27
-
MD5
7f8b8c560029a21fbadf084a25f50e36
-
SHA1
c188e3dd31d3576da51a38eeceab755eba796506
-
SHA256
f2e22b73b2f442d04994f3b6c7e25c9aca9e805170948896fd3ac271b9893242
-
SHA512
588325a7121b93c581839f48d03f7c49973419e81cafe82611a747004f9c653a2fb897a1ae1285bab096d55c47f10d242c7d9e2e453e25716785675ed3b8bfde
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNgerar/cH:T6a+rdOOtEvwDpjLzl
Behavioral task
behavioral1
Sample
2024-02-14_7f8b8c560029a21fbadf084a25f50e36_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-14_7f8b8c560029a21fbadf084a25f50e36_cryptolocker.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-02-14_7f8b8c560029a21fbadf084a25f50e36_cryptolocker
-
Size
116KB
-
MD5
7f8b8c560029a21fbadf084a25f50e36
-
SHA1
c188e3dd31d3576da51a38eeceab755eba796506
-
SHA256
f2e22b73b2f442d04994f3b6c7e25c9aca9e805170948896fd3ac271b9893242
-
SHA512
588325a7121b93c581839f48d03f7c49973419e81cafe82611a747004f9c653a2fb897a1ae1285bab096d55c47f10d242c7d9e2e453e25716785675ed3b8bfde
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNgerar/cH:T6a+rdOOtEvwDpjLzl
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-