General
-
Target
2024-02-17_3f14f47843e63a9a5db7444f2e1cfc8d_cryptolocker
-
Size
45KB
-
Sample
240217-2kd5rsbh73
-
MD5
3f14f47843e63a9a5db7444f2e1cfc8d
-
SHA1
f1406bbc9298d93751893eb1f35f9b93fed6f9e4
-
SHA256
1090e96fb2365fda680db0cc3de99e597d524e2f50b362ad1473dc24c47ac392
-
SHA512
0d8258de6b15241b98af026b5a113b46c883a6062e71b7ef29a8907fedc781c1e900065e7134dd155c9a5bcbae250efeff4e642610487ef8f15f6ce8f0454cd1
-
SSDEEP
768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05WTBG:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ6c
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-17_3f14f47843e63a9a5db7444f2e1cfc8d_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-17_3f14f47843e63a9a5db7444f2e1cfc8d_cryptolocker.exe
Resource
win10v2004-20231222-en
Malware Config
Targets
-
-
Target
2024-02-17_3f14f47843e63a9a5db7444f2e1cfc8d_cryptolocker
-
Size
45KB
-
MD5
3f14f47843e63a9a5db7444f2e1cfc8d
-
SHA1
f1406bbc9298d93751893eb1f35f9b93fed6f9e4
-
SHA256
1090e96fb2365fda680db0cc3de99e597d524e2f50b362ad1473dc24c47ac392
-
SHA512
0d8258de6b15241b98af026b5a113b46c883a6062e71b7ef29a8907fedc781c1e900065e7134dd155c9a5bcbae250efeff4e642610487ef8f15f6ce8f0454cd1
-
SSDEEP
768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05WTBG:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ6c
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-