General
-
Target
2024-02-17_95d45a58dc93925d4d17235a192999e8_cryptolocker
-
Size
147KB
-
Sample
240217-2tzstsca67
-
MD5
95d45a58dc93925d4d17235a192999e8
-
SHA1
60f2f2ffe9f97585c8269a1165784b7ead0977b1
-
SHA256
64f52ca89790e714017a0516e9dec1b3d6926c74f147747d9b882cbb837eb48a
-
SHA512
69e7db0676dbef2813132566f2a20ddcaf7cf25f3ae83b1e1c62c05cde0574bf45805dfc8c1c64b182f88a90fd9e204e99442bb71f9ee3bc2a42c7da06f51c1f
-
SSDEEP
1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp699GNtL1eSZ:z6a+CdOOtEvwDpjcz8
Behavioral task
behavioral1
Sample
2024-02-17_95d45a58dc93925d4d17235a192999e8_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-02-17_95d45a58dc93925d4d17235a192999e8_cryptolocker.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-02-17_95d45a58dc93925d4d17235a192999e8_cryptolocker
-
Size
147KB
-
MD5
95d45a58dc93925d4d17235a192999e8
-
SHA1
60f2f2ffe9f97585c8269a1165784b7ead0977b1
-
SHA256
64f52ca89790e714017a0516e9dec1b3d6926c74f147747d9b882cbb837eb48a
-
SHA512
69e7db0676dbef2813132566f2a20ddcaf7cf25f3ae83b1e1c62c05cde0574bf45805dfc8c1c64b182f88a90fd9e204e99442bb71f9ee3bc2a42c7da06f51c1f
-
SSDEEP
1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp699GNtL1eSZ:z6a+CdOOtEvwDpjcz8
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-