General
-
Target
2024-02-20_e3c09883454d0592ec336e98b0fa9d7f_cryptolocker
-
Size
46KB
-
Sample
240220-sppbvsba83
-
MD5
e3c09883454d0592ec336e98b0fa9d7f
-
SHA1
20053d223d0f5223891f22b95aada40ea3ea2a5d
-
SHA256
725572b4887b3c3f509707f8ac6b7aa35c1e1c5090c307f4226a94eabaf18af4
-
SHA512
47598335d524d099fb552725a55f9ff9858110b662e72af46037bd543b6575c82476eeee8fe8ed4c7860dbd0fc603fe082690acea28fc90b05579737703d163f
-
SSDEEP
768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoLZ:qmbhXDmjr5MOtEvwDpj5cDtKkQZQz
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-20_e3c09883454d0592ec336e98b0fa9d7f_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-20_e3c09883454d0592ec336e98b0fa9d7f_cryptolocker.exe
Resource
win10v2004-20240220-en
Malware Config
Targets
-
-
Target
2024-02-20_e3c09883454d0592ec336e98b0fa9d7f_cryptolocker
-
Size
46KB
-
MD5
e3c09883454d0592ec336e98b0fa9d7f
-
SHA1
20053d223d0f5223891f22b95aada40ea3ea2a5d
-
SHA256
725572b4887b3c3f509707f8ac6b7aa35c1e1c5090c307f4226a94eabaf18af4
-
SHA512
47598335d524d099fb552725a55f9ff9858110b662e72af46037bd543b6575c82476eeee8fe8ed4c7860dbd0fc603fe082690acea28fc90b05579737703d163f
-
SSDEEP
768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoLZ:qmbhXDmjr5MOtEvwDpj5cDtKkQZQz
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-