General
-
Target
2024-02-21_e59917dbbae23f18d9a63e85f9e0e920_cryptolocker
-
Size
87KB
-
Sample
240221-nzywtsfc97
-
MD5
e59917dbbae23f18d9a63e85f9e0e920
-
SHA1
ecb86ce46c8a45d037cb837f3b030d7428fd9c41
-
SHA256
90bcc3be7ac0dc8ed890eacd2aef99da7adfb402760964976c073c5a47271948
-
SHA512
6df5b63093b378af10bb2b9ac8d998c1eae6daa99b26a0bf2d966dcc106a68e1f028ecb08b0f9b9c9dd23fcaa180f32bac02f7e534a134861ce9aefce0a58be7
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgLq:AnBdOOtEvwDpj6zy
Behavioral task
behavioral1
Sample
2024-02-21_e59917dbbae23f18d9a63e85f9e0e920_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-02-21_e59917dbbae23f18d9a63e85f9e0e920_cryptolocker.exe
Resource
win10v2004-20240220-en
Malware Config
Targets
-
-
Target
2024-02-21_e59917dbbae23f18d9a63e85f9e0e920_cryptolocker
-
Size
87KB
-
MD5
e59917dbbae23f18d9a63e85f9e0e920
-
SHA1
ecb86ce46c8a45d037cb837f3b030d7428fd9c41
-
SHA256
90bcc3be7ac0dc8ed890eacd2aef99da7adfb402760964976c073c5a47271948
-
SHA512
6df5b63093b378af10bb2b9ac8d998c1eae6daa99b26a0bf2d966dcc106a68e1f028ecb08b0f9b9c9dd23fcaa180f32bac02f7e534a134861ce9aefce0a58be7
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgLq:AnBdOOtEvwDpj6zy
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-