General
-
Target
2024-02-19_13ab7d91b67a086190a68f6c7fb4f60d_cryptolocker
-
Size
105KB
-
Sample
240219-yglhwscd92
-
MD5
13ab7d91b67a086190a68f6c7fb4f60d
-
SHA1
1fd566dd641c6e7f7d27056e9e5298fd79a0df11
-
SHA256
69296912407417b0463bda9c9a1d96680b6a98257ab10bb15a74d80bd3459509
-
SHA512
fb888eb21c9fe67d0f01ec0f28183b02c11c0a08d3d9318d6b0a8dbe27362a7edda02f8a94e493ce5957a60d307e0170ce8a376d48eba71e7b386d95d765c0c5
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GksG:1nK6a+qdOOtEvwDpjG
Behavioral task
behavioral1
Sample
2024-02-19_13ab7d91b67a086190a68f6c7fb4f60d_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-19_13ab7d91b67a086190a68f6c7fb4f60d_cryptolocker.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-02-19_13ab7d91b67a086190a68f6c7fb4f60d_cryptolocker
-
Size
105KB
-
MD5
13ab7d91b67a086190a68f6c7fb4f60d
-
SHA1
1fd566dd641c6e7f7d27056e9e5298fd79a0df11
-
SHA256
69296912407417b0463bda9c9a1d96680b6a98257ab10bb15a74d80bd3459509
-
SHA512
fb888eb21c9fe67d0f01ec0f28183b02c11c0a08d3d9318d6b0a8dbe27362a7edda02f8a94e493ce5957a60d307e0170ce8a376d48eba71e7b386d95d765c0c5
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GksG:1nK6a+qdOOtEvwDpjG
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-