General
-
Target
2024-02-19_7bd6d92a521845156f8e66d8854eb10f_cryptolocker
-
Size
91KB
-
Sample
240219-t6bmrsgd2t
-
MD5
7bd6d92a521845156f8e66d8854eb10f
-
SHA1
15a6e598f08ff546e46ff4318b53e42172c60723
-
SHA256
aed7a8e90e70ac66e37e8c86f4e1ec8a6ea24f544a5a5a9c7e41385cf075e761
-
SHA512
2bbf067418d900818e0c2c9bcd2e0264cac8554a40d3c0a700c59685d93b5fde835e8af4ed694df7b3bf91dd8d326fef68012d51df4f7538a3a1659dc209b151
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRMy87Uvq:zCsanOtEvwDpjX
Behavioral task
behavioral1
Sample
2024-02-19_7bd6d92a521845156f8e66d8854eb10f_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-02-19_7bd6d92a521845156f8e66d8854eb10f_cryptolocker.exe
Resource
win10v2004-20231222-en
Malware Config
Targets
-
-
Target
2024-02-19_7bd6d92a521845156f8e66d8854eb10f_cryptolocker
-
Size
91KB
-
MD5
7bd6d92a521845156f8e66d8854eb10f
-
SHA1
15a6e598f08ff546e46ff4318b53e42172c60723
-
SHA256
aed7a8e90e70ac66e37e8c86f4e1ec8a6ea24f544a5a5a9c7e41385cf075e761
-
SHA512
2bbf067418d900818e0c2c9bcd2e0264cac8554a40d3c0a700c59685d93b5fde835e8af4ed694df7b3bf91dd8d326fef68012d51df4f7538a3a1659dc209b151
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRMy87Uvq:zCsanOtEvwDpjX
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-