General
-
Target
2024-02-19_657dd7b24f1b94f86f7042099bb362a8_cryptolocker
-
Size
95KB
-
Sample
240219-feyfkahg7y
-
MD5
657dd7b24f1b94f86f7042099bb362a8
-
SHA1
21ff7dc25235b5202c76c17efd47dcb8fbdf60db
-
SHA256
7233a80ae140ef51b51c8937bcd46b1cb7bc4cf08eb148cfd889ec5655e62700
-
SHA512
37bdd776666a5bb26df11863b256fd621f539c09947f0e061b3c3697248f4b67eb490d4d324c169851860edaa60fba6f67a0a34a982ac9b4a1e86f2906f1e4b1
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp01k:AnBdOOtEvwDpj6zi
Behavioral task
behavioral1
Sample
2024-02-19_657dd7b24f1b94f86f7042099bb362a8_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-02-19_657dd7b24f1b94f86f7042099bb362a8_cryptolocker.exe
Resource
win10v2004-20231222-en
Malware Config
Targets
-
-
Target
2024-02-19_657dd7b24f1b94f86f7042099bb362a8_cryptolocker
-
Size
95KB
-
MD5
657dd7b24f1b94f86f7042099bb362a8
-
SHA1
21ff7dc25235b5202c76c17efd47dcb8fbdf60db
-
SHA256
7233a80ae140ef51b51c8937bcd46b1cb7bc4cf08eb148cfd889ec5655e62700
-
SHA512
37bdd776666a5bb26df11863b256fd621f539c09947f0e061b3c3697248f4b67eb490d4d324c169851860edaa60fba6f67a0a34a982ac9b4a1e86f2906f1e4b1
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp01k:AnBdOOtEvwDpj6zi
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-