General
-
Target
2024-02-22_ee6166930269293c6009fe0dbef3b31e_cryptolocker
-
Size
126KB
-
Sample
240222-3n7f6age4y
-
MD5
ee6166930269293c6009fe0dbef3b31e
-
SHA1
6482f85ec3fab3ffa079080838be01b994516fd3
-
SHA256
6d97e6a326604eaff9c329933bad6815ed4a6fd2564502aaa0efdb4743afbd62
-
SHA512
df6a16bdf071d05139e0bc5ddf657beaf2e04a880434c0c6856a868892a9b692da8caf9207a82f344ccf987205276ab0baa977033509a5f955d5c167be4603fb
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1eF:AnBdOOtEvwDpj6zP
Behavioral task
behavioral1
Sample
2024-02-22_ee6166930269293c6009fe0dbef3b31e_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-02-22_ee6166930269293c6009fe0dbef3b31e_cryptolocker.exe
Resource
win10v2004-20240221-en
Malware Config
Targets
-
-
Target
2024-02-22_ee6166930269293c6009fe0dbef3b31e_cryptolocker
-
Size
126KB
-
MD5
ee6166930269293c6009fe0dbef3b31e
-
SHA1
6482f85ec3fab3ffa079080838be01b994516fd3
-
SHA256
6d97e6a326604eaff9c329933bad6815ed4a6fd2564502aaa0efdb4743afbd62
-
SHA512
df6a16bdf071d05139e0bc5ddf657beaf2e04a880434c0c6856a868892a9b692da8caf9207a82f344ccf987205276ab0baa977033509a5f955d5c167be4603fb
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1eF:AnBdOOtEvwDpj6zP
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-