General
-
Target
2024-02-18_e243218ea44865c58c3cef745280d79d_cryptolocker
-
Size
85KB
-
Sample
240218-vhp1xsda49
-
MD5
e243218ea44865c58c3cef745280d79d
-
SHA1
9d60569728707f05619062ebdb607fc76de8060d
-
SHA256
6c4ae5fa3e4d71044b8c491912e302a658ce13b12ed9876b826b618d83404f5e
-
SHA512
5206f7f45bc87280f8fb45395a5a8fb85a287fd77b82d84b0a5b7b6b5a9f451c347a6ebbf301a4c8feaebce999170ffd6d3af861b6f69f640bc84e468ce58388
-
SSDEEP
768:qkmnjFom/kLyMro2GtOOtEvwDpjeY10Y/YMsvlMdwPK80GQuchoIgtISEh:qkmnpomddpMOtEvwDpjJGYQbN/PKwMg0
Behavioral task
behavioral1
Sample
2024-02-18_e243218ea44865c58c3cef745280d79d_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-18_e243218ea44865c58c3cef745280d79d_cryptolocker.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-02-18_e243218ea44865c58c3cef745280d79d_cryptolocker
-
Size
85KB
-
MD5
e243218ea44865c58c3cef745280d79d
-
SHA1
9d60569728707f05619062ebdb607fc76de8060d
-
SHA256
6c4ae5fa3e4d71044b8c491912e302a658ce13b12ed9876b826b618d83404f5e
-
SHA512
5206f7f45bc87280f8fb45395a5a8fb85a287fd77b82d84b0a5b7b6b5a9f451c347a6ebbf301a4c8feaebce999170ffd6d3af861b6f69f640bc84e468ce58388
-
SSDEEP
768:qkmnjFom/kLyMro2GtOOtEvwDpjeY10Y/YMsvlMdwPK80GQuchoIgtISEh:qkmnpomddpMOtEvwDpjJGYQbN/PKwMg0
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-