General
-
Target
2024-02-17_9006bdbe3df5d53c9c34e1380b8583e2_cryptolocker
-
Size
68KB
-
Sample
240217-1mvd4aba8y
-
MD5
9006bdbe3df5d53c9c34e1380b8583e2
-
SHA1
25ffb09b67af87653053266602c64819519287f6
-
SHA256
81ce1099f82511b27f7b98caf77da2c08f3a53594949c35ff231e0a11dbe8477
-
SHA512
3b10e795b5195cfc78f2ffa45628697ead31096da88a0c161e8d6ddd62e1bca5a8f741472088d68e0e8106717451f04aeba1626ec24c94aa7e6be0860d60eab7
-
SSDEEP
1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAeBq:z6a+CdOOtEvwDpjQ8
Behavioral task
behavioral1
Sample
2024-02-17_9006bdbe3df5d53c9c34e1380b8583e2_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-17_9006bdbe3df5d53c9c34e1380b8583e2_cryptolocker.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-02-17_9006bdbe3df5d53c9c34e1380b8583e2_cryptolocker
-
Size
68KB
-
MD5
9006bdbe3df5d53c9c34e1380b8583e2
-
SHA1
25ffb09b67af87653053266602c64819519287f6
-
SHA256
81ce1099f82511b27f7b98caf77da2c08f3a53594949c35ff231e0a11dbe8477
-
SHA512
3b10e795b5195cfc78f2ffa45628697ead31096da88a0c161e8d6ddd62e1bca5a8f741472088d68e0e8106717451f04aeba1626ec24c94aa7e6be0860d60eab7
-
SSDEEP
1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAeBq:z6a+CdOOtEvwDpjQ8
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-