General
-
Target
2024-02-18_9eb7c2d7b75aeecc4edbfb8a9a80a474_cryptolocker
-
Size
85KB
-
Sample
240218-xc3qyaea78
-
MD5
9eb7c2d7b75aeecc4edbfb8a9a80a474
-
SHA1
19cffc3403353dbb6d8b8557c14a95f325532da6
-
SHA256
948ad926bd9782350d8197cd52f6c02bb08a3806e45ac449a652f10cb1474758
-
SHA512
0ee329b47123d8e503acffc8f2293591f5c7443ce57cf37e2e4e6b01ce7a180f285408f88b845cfe22ce4f2d30b33366cf2d3452bccf7fba090ee06282ce044e
-
SSDEEP
768:qkmnjFom/kLyMro2GtOOtEvwDpjeY10Y/YMsvlMdwPK80GQuchoIgtISEi:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgb
Behavioral task
behavioral1
Sample
2024-02-18_9eb7c2d7b75aeecc4edbfb8a9a80a474_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-18_9eb7c2d7b75aeecc4edbfb8a9a80a474_cryptolocker.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-02-18_9eb7c2d7b75aeecc4edbfb8a9a80a474_cryptolocker
-
Size
85KB
-
MD5
9eb7c2d7b75aeecc4edbfb8a9a80a474
-
SHA1
19cffc3403353dbb6d8b8557c14a95f325532da6
-
SHA256
948ad926bd9782350d8197cd52f6c02bb08a3806e45ac449a652f10cb1474758
-
SHA512
0ee329b47123d8e503acffc8f2293591f5c7443ce57cf37e2e4e6b01ce7a180f285408f88b845cfe22ce4f2d30b33366cf2d3452bccf7fba090ee06282ce044e
-
SSDEEP
768:qkmnjFom/kLyMro2GtOOtEvwDpjeY10Y/YMsvlMdwPK80GQuchoIgtISEi:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgb
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-