General
-
Target
2024-02-21_fba82484b448b54aa4cad32018a7d476_cryptolocker
-
Size
89KB
-
Sample
240221-vhe6qacb47
-
MD5
fba82484b448b54aa4cad32018a7d476
-
SHA1
3a30ff2058d8630ffa37c687822cd618d240f62b
-
SHA256
5343cf7952374e0c403d3d76a04a1d1e5c0e14d6b625066bdc0e32d442fd12b4
-
SHA512
167b8ce9d2e572d26cc6744d1eeeb22f7a3929bb33b448081a543f382b30b5d3507b615ce6c8cdc6a712b43d03b578c38b1581856b45013d913b57a5228790b4
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMg1v:AnBdOOtEvwDpj6z5
Behavioral task
behavioral1
Sample
2024-02-21_fba82484b448b54aa4cad32018a7d476_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-21_fba82484b448b54aa4cad32018a7d476_cryptolocker.exe
Resource
win10v2004-20240221-en
Malware Config
Targets
-
-
Target
2024-02-21_fba82484b448b54aa4cad32018a7d476_cryptolocker
-
Size
89KB
-
MD5
fba82484b448b54aa4cad32018a7d476
-
SHA1
3a30ff2058d8630ffa37c687822cd618d240f62b
-
SHA256
5343cf7952374e0c403d3d76a04a1d1e5c0e14d6b625066bdc0e32d442fd12b4
-
SHA512
167b8ce9d2e572d26cc6744d1eeeb22f7a3929bb33b448081a543f382b30b5d3507b615ce6c8cdc6a712b43d03b578c38b1581856b45013d913b57a5228790b4
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMg1v:AnBdOOtEvwDpj6z5
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-