General
-
Target
2024-02-17_f9c0f425fc08f9edc48a04ba36704c4e_cryptolocker
-
Size
88KB
-
Sample
240217-jwbjxacf81
-
MD5
f9c0f425fc08f9edc48a04ba36704c4e
-
SHA1
05ab1de00402cace5bb411df435c0eb35b2ddd92
-
SHA256
50e48d7a00ce6cde4403f24f3a37124efadf1a6c752ac8d467ec0787fe99c61b
-
SHA512
3f79a1878b377deb50d47714b66f7610c55c842d0a515cff612a362cba24ea210df00c4a94a41cfaddadaa04e4a23ec47d87765e4a05c51ab05da3536a392179
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgd/:AnBdOOtEvwDpj6z5
Behavioral task
behavioral1
Sample
2024-02-17_f9c0f425fc08f9edc48a04ba36704c4e_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-17_f9c0f425fc08f9edc48a04ba36704c4e_cryptolocker.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-02-17_f9c0f425fc08f9edc48a04ba36704c4e_cryptolocker
-
Size
88KB
-
MD5
f9c0f425fc08f9edc48a04ba36704c4e
-
SHA1
05ab1de00402cace5bb411df435c0eb35b2ddd92
-
SHA256
50e48d7a00ce6cde4403f24f3a37124efadf1a6c752ac8d467ec0787fe99c61b
-
SHA512
3f79a1878b377deb50d47714b66f7610c55c842d0a515cff612a362cba24ea210df00c4a94a41cfaddadaa04e4a23ec47d87765e4a05c51ab05da3536a392179
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgd/:AnBdOOtEvwDpj6z5
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-