General
-
Target
2024-02-18_371099155037bdec412a841a67534499_cryptolocker
-
Size
79KB
-
Sample
240218-ke8czsgc88
-
MD5
371099155037bdec412a841a67534499
-
SHA1
82c2666347afc07e9b8daf467b01d4270dc58f4c
-
SHA256
f12154c8a00eeb1facadd8acc0b2adbd6f85d9cb83e66b97edebf6150ce0f14d
-
SHA512
bde393aaf5bf912df178de90254157c5c7a6fb1a40ec44bfa14c2afc3b7c8d8656798ede91c1e8fc064b8ac88898f92f958607183177fa32dd04871ec1e0845d
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyhuqP:zCsanOtEvwDpjU
Behavioral task
behavioral1
Sample
2024-02-18_371099155037bdec412a841a67534499_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-18_371099155037bdec412a841a67534499_cryptolocker.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-02-18_371099155037bdec412a841a67534499_cryptolocker
-
Size
79KB
-
MD5
371099155037bdec412a841a67534499
-
SHA1
82c2666347afc07e9b8daf467b01d4270dc58f4c
-
SHA256
f12154c8a00eeb1facadd8acc0b2adbd6f85d9cb83e66b97edebf6150ce0f14d
-
SHA512
bde393aaf5bf912df178de90254157c5c7a6fb1a40ec44bfa14c2afc3b7c8d8656798ede91c1e8fc064b8ac88898f92f958607183177fa32dd04871ec1e0845d
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyhuqP:zCsanOtEvwDpjU
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-