General
-
Target
2024-02-17_64fd08d586572cd992678345b6e0fef9_cryptolocker
-
Size
96KB
-
Sample
240217-sxfppagc2t
-
MD5
64fd08d586572cd992678345b6e0fef9
-
SHA1
cba5d760ebcccd897f47b51cb4ceccc9b92e0fe4
-
SHA256
3c0d5edb77b67e2f3ff1e7841676ffc9ac07f391b43f45da427c34f5a77f37be
-
SHA512
2ba8c35930b046fa078f02c6122ea09c4b05698e3dbbcbccf4b66fc77c078137d5cc9d6d1c37f458b514120a34fdb78886ba607cc4f6abd3022c5be89595499d
-
SSDEEP
1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbbr/Bc:z6a+CdOOtEvwDpjcq
Behavioral task
behavioral1
Sample
2024-02-17_64fd08d586572cd992678345b6e0fef9_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-02-17_64fd08d586572cd992678345b6e0fef9_cryptolocker.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-02-17_64fd08d586572cd992678345b6e0fef9_cryptolocker
-
Size
96KB
-
MD5
64fd08d586572cd992678345b6e0fef9
-
SHA1
cba5d760ebcccd897f47b51cb4ceccc9b92e0fe4
-
SHA256
3c0d5edb77b67e2f3ff1e7841676ffc9ac07f391b43f45da427c34f5a77f37be
-
SHA512
2ba8c35930b046fa078f02c6122ea09c4b05698e3dbbcbccf4b66fc77c078137d5cc9d6d1c37f458b514120a34fdb78886ba607cc4f6abd3022c5be89595499d
-
SSDEEP
1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbbr/Bc:z6a+CdOOtEvwDpjcq
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-