General
-
Target
2024-02-18_5dab387d8bfa8d37f157c46029a3d74a_cryptolocker
-
Size
65KB
-
Sample
240218-d5w93sdh82
-
MD5
5dab387d8bfa8d37f157c46029a3d74a
-
SHA1
b13857b2bea066d59e3cae19fe6dcd6e841f20ab
-
SHA256
9816158731ef412c5f0ae30ee71cf10cd7ee986ccf2d58a0575bfd9c09c87d60
-
SHA512
7891daa3e2ba4ce5fe26cc53a424a26e5128f912b96d1d5e9c59efb69d0b85cff491f19f11d3510b49e9d22f4c8b508914211a3ecf58b021111dbaada8a4fa43
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYjc3CBB:1nK6a+qdOOtEvwDpjsB
Behavioral task
behavioral1
Sample
2024-02-18_5dab387d8bfa8d37f157c46029a3d74a_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-18_5dab387d8bfa8d37f157c46029a3d74a_cryptolocker.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-02-18_5dab387d8bfa8d37f157c46029a3d74a_cryptolocker
-
Size
65KB
-
MD5
5dab387d8bfa8d37f157c46029a3d74a
-
SHA1
b13857b2bea066d59e3cae19fe6dcd6e841f20ab
-
SHA256
9816158731ef412c5f0ae30ee71cf10cd7ee986ccf2d58a0575bfd9c09c87d60
-
SHA512
7891daa3e2ba4ce5fe26cc53a424a26e5128f912b96d1d5e9c59efb69d0b85cff491f19f11d3510b49e9d22f4c8b508914211a3ecf58b021111dbaada8a4fa43
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYjc3CBB:1nK6a+qdOOtEvwDpjsB
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-