General
-
Target
2024-02-21_41760cc51ba3fd4f7628a42db55a05d6_cryptolocker
-
Size
98KB
-
Sample
240221-w5w87adb8w
-
MD5
41760cc51ba3fd4f7628a42db55a05d6
-
SHA1
541e056cf430ef1bcc9b2473f74ee49d14e3e5e7
-
SHA256
5aa956bbdaf97bddc349cd256b6fa276f506f42e45d2b4fca31f082ffb6deb96
-
SHA512
17cb0360b58ccf6784f282516027b1300fb925da8b62e2834017129cc3e2cff19c9a5fccc88eb81a3b30d0f3a47b305dd9a98dbd0e5fdd5ef89e5f43a5905e91
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpwqWsviPGF2b:AnBdOOtEvwDpj6zPb
Behavioral task
behavioral1
Sample
2024-02-21_41760cc51ba3fd4f7628a42db55a05d6_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-21_41760cc51ba3fd4f7628a42db55a05d6_cryptolocker.exe
Resource
win10v2004-20240221-en
Malware Config
Targets
-
-
Target
2024-02-21_41760cc51ba3fd4f7628a42db55a05d6_cryptolocker
-
Size
98KB
-
MD5
41760cc51ba3fd4f7628a42db55a05d6
-
SHA1
541e056cf430ef1bcc9b2473f74ee49d14e3e5e7
-
SHA256
5aa956bbdaf97bddc349cd256b6fa276f506f42e45d2b4fca31f082ffb6deb96
-
SHA512
17cb0360b58ccf6784f282516027b1300fb925da8b62e2834017129cc3e2cff19c9a5fccc88eb81a3b30d0f3a47b305dd9a98dbd0e5fdd5ef89e5f43a5905e91
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpwqWsviPGF2b:AnBdOOtEvwDpj6zPb
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-