General
-
Target
2024-02-17_c705f29129e53da523a1ad5ed80ffc30_cryptolocker
-
Size
148KB
-
Sample
240217-krbvjsda9z
-
MD5
c705f29129e53da523a1ad5ed80ffc30
-
SHA1
af21ee8227436634e668bc552a63dbb7a3a0c481
-
SHA256
06872054e8648dfbcb5a6efda6814a14f75ef8a4b50d1d392d2c18e8de86fd31
-
SHA512
a1aa3856460368f423fee769dd52685800e214097e1402bc8c332eac3052e01fea653ac18154c5bb13f7479844f8b0656c817fc7cfe3e772ab8782b5ede264ad
-
SSDEEP
1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp699GNtL1es:z6a+CdOOtEvwDpjczS
Behavioral task
behavioral1
Sample
2024-02-17_c705f29129e53da523a1ad5ed80ffc30_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-02-17_c705f29129e53da523a1ad5ed80ffc30_cryptolocker.exe
Resource
win10v2004-20231222-en
Malware Config
Targets
-
-
Target
2024-02-17_c705f29129e53da523a1ad5ed80ffc30_cryptolocker
-
Size
148KB
-
MD5
c705f29129e53da523a1ad5ed80ffc30
-
SHA1
af21ee8227436634e668bc552a63dbb7a3a0c481
-
SHA256
06872054e8648dfbcb5a6efda6814a14f75ef8a4b50d1d392d2c18e8de86fd31
-
SHA512
a1aa3856460368f423fee769dd52685800e214097e1402bc8c332eac3052e01fea653ac18154c5bb13f7479844f8b0656c817fc7cfe3e772ab8782b5ede264ad
-
SSDEEP
1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp699GNtL1es:z6a+CdOOtEvwDpjczS
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-