General
-
Target
2024-02-20_fe60109d50ba518970b7f9b2f3e703c2_cryptolocker
-
Size
63KB
-
Sample
240220-1nc67sfh53
-
MD5
fe60109d50ba518970b7f9b2f3e703c2
-
SHA1
bec316a5ddd082a437cb84682d0857102f1199d1
-
SHA256
8788b9bfb19402d7c5685fcffa227806f45225a14fe45bc875d5de6a2a02aae6
-
SHA512
9afe8c59dc740db1f07c87415e0975fa7ff154f95b702d5ced5352422c0fc3aa91ccc3dad8d7e1c801b6947e0bb5e5706810372a6ae3ce8b1a76ecd3c0814dd2
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAoR:1nK6a+qdOOtEvwDpjP
Behavioral task
behavioral1
Sample
2024-02-20_fe60109d50ba518970b7f9b2f3e703c2_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-20_fe60109d50ba518970b7f9b2f3e703c2_cryptolocker.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-02-20_fe60109d50ba518970b7f9b2f3e703c2_cryptolocker
-
Size
63KB
-
MD5
fe60109d50ba518970b7f9b2f3e703c2
-
SHA1
bec316a5ddd082a437cb84682d0857102f1199d1
-
SHA256
8788b9bfb19402d7c5685fcffa227806f45225a14fe45bc875d5de6a2a02aae6
-
SHA512
9afe8c59dc740db1f07c87415e0975fa7ff154f95b702d5ced5352422c0fc3aa91ccc3dad8d7e1c801b6947e0bb5e5706810372a6ae3ce8b1a76ecd3c0814dd2
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAoR:1nK6a+qdOOtEvwDpjP
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-