General
-
Target
2024-02-20_5d896f9c156e22f0f9d4d00a844090fb_cryptolocker
-
Size
99KB
-
Sample
240220-mkptyaeh7w
-
MD5
5d896f9c156e22f0f9d4d00a844090fb
-
SHA1
3beaeff2db8de3f99851238fbd5ba0aebda5f5c3
-
SHA256
00b76c9b7add654591f7c879b8300c962a3c6310e1f698a27a5256c8fcaa2afb
-
SHA512
926981fa99d59143b937a97d9d1387480f1b3b2dc3650320272849309e376b8e06e012ce3cca6d8cad029084cc1cb5bc61973e2c9953e8fddee34fd54630fe99
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpwqWsviPyl:AnBdOOtEvwDpj6za
Behavioral task
behavioral1
Sample
2024-02-20_5d896f9c156e22f0f9d4d00a844090fb_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-02-20_5d896f9c156e22f0f9d4d00a844090fb_cryptolocker.exe
Resource
win10v2004-20240220-en
Malware Config
Targets
-
-
Target
2024-02-20_5d896f9c156e22f0f9d4d00a844090fb_cryptolocker
-
Size
99KB
-
MD5
5d896f9c156e22f0f9d4d00a844090fb
-
SHA1
3beaeff2db8de3f99851238fbd5ba0aebda5f5c3
-
SHA256
00b76c9b7add654591f7c879b8300c962a3c6310e1f698a27a5256c8fcaa2afb
-
SHA512
926981fa99d59143b937a97d9d1387480f1b3b2dc3650320272849309e376b8e06e012ce3cca6d8cad029084cc1cb5bc61973e2c9953e8fddee34fd54630fe99
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpwqWsviPyl:AnBdOOtEvwDpj6za
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-