General
-
Target
2024-02-19_487c1c8b7544072ba664d60dc4d37e43_cryptolocker
-
Size
88KB
-
Sample
240219-x5y88acb28
-
MD5
487c1c8b7544072ba664d60dc4d37e43
-
SHA1
bf18f0941930f0072309a38f6df0ce53b238ef56
-
SHA256
a7b697192d5b62b8e33417307f6473a5f919fd5a72900a61f5a44eff379d28ba
-
SHA512
d4743a1596c02449b8cbd3088ef00e9f9ff7dab53025e998db50ef6b8b05003ecadafeb5613f11d215cba52db8dfac2cf42fe54e1a147affa56637a320d9efcb
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgddg:AnBdOOtEvwDpj6z0
Behavioral task
behavioral1
Sample
2024-02-19_487c1c8b7544072ba664d60dc4d37e43_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-19_487c1c8b7544072ba664d60dc4d37e43_cryptolocker.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-02-19_487c1c8b7544072ba664d60dc4d37e43_cryptolocker
-
Size
88KB
-
MD5
487c1c8b7544072ba664d60dc4d37e43
-
SHA1
bf18f0941930f0072309a38f6df0ce53b238ef56
-
SHA256
a7b697192d5b62b8e33417307f6473a5f919fd5a72900a61f5a44eff379d28ba
-
SHA512
d4743a1596c02449b8cbd3088ef00e9f9ff7dab53025e998db50ef6b8b05003ecadafeb5613f11d215cba52db8dfac2cf42fe54e1a147affa56637a320d9efcb
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgddg:AnBdOOtEvwDpj6z0
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-