General
-
Target
2024-02-19_a89eea4f7477c3fdb11dbe10b292d0a3_cryptolocker
-
Size
56KB
-
Sample
240219-tbcatafg36
-
MD5
a89eea4f7477c3fdb11dbe10b292d0a3
-
SHA1
97237d7965d479277aab870d9940c40188bffa68
-
SHA256
10b3a34e052bbc53ea84905f9c745e9887d0f5ac6279726d17733fc7ea7c3d4d
-
SHA512
5940d63bc32e51b44061254b942760698d4dce7b6f5562de9023907fff88e343e698c1aebfe4a70b8421a8c120de1cdd0a312c02128ebf74a18d2612b5570ddb
-
SSDEEP
1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb616N:BbdDmjr+OtEvwDpjMc
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-19_a89eea4f7477c3fdb11dbe10b292d0a3_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-02-19_a89eea4f7477c3fdb11dbe10b292d0a3_cryptolocker.exe
Resource
win10v2004-20231222-en
Malware Config
Targets
-
-
Target
2024-02-19_a89eea4f7477c3fdb11dbe10b292d0a3_cryptolocker
-
Size
56KB
-
MD5
a89eea4f7477c3fdb11dbe10b292d0a3
-
SHA1
97237d7965d479277aab870d9940c40188bffa68
-
SHA256
10b3a34e052bbc53ea84905f9c745e9887d0f5ac6279726d17733fc7ea7c3d4d
-
SHA512
5940d63bc32e51b44061254b942760698d4dce7b6f5562de9023907fff88e343e698c1aebfe4a70b8421a8c120de1cdd0a312c02128ebf74a18d2612b5570ddb
-
SSDEEP
1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb616N:BbdDmjr+OtEvwDpjMc
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-