General
-
Target
2024-02-22_8096a6bef98755294f313affc2fa4419_cryptolocker
-
Size
35KB
-
Sample
240222-t3jtzace3v
-
MD5
8096a6bef98755294f313affc2fa4419
-
SHA1
306b37df56fcbbfd59038759525bec4c847f68c9
-
SHA256
c994f0e79a706b25506385dbd206c116d926bca0afa9e8c6ee8ebdab176f7201
-
SHA512
a83edce52c31cc08e6f8da282899ee80645ade31e44b79cd6d1e9c5949b22be6b9f6c0206b6f88e8b587305a72e3fb1e0fc38830472016f531cf18b6635d1f14
-
SSDEEP
384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSzn1KkZCb9q8INBjup:b/yC4GyNM01GuQMNXw2PSj1Pqq8oBjM
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-22_8096a6bef98755294f313affc2fa4419_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-02-22_8096a6bef98755294f313affc2fa4419_cryptolocker.exe
Resource
win10v2004-20240221-en
Malware Config
Targets
-
-
Target
2024-02-22_8096a6bef98755294f313affc2fa4419_cryptolocker
-
Size
35KB
-
MD5
8096a6bef98755294f313affc2fa4419
-
SHA1
306b37df56fcbbfd59038759525bec4c847f68c9
-
SHA256
c994f0e79a706b25506385dbd206c116d926bca0afa9e8c6ee8ebdab176f7201
-
SHA512
a83edce52c31cc08e6f8da282899ee80645ade31e44b79cd6d1e9c5949b22be6b9f6c0206b6f88e8b587305a72e3fb1e0fc38830472016f531cf18b6635d1f14
-
SSDEEP
384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSzn1KkZCb9q8INBjup:b/yC4GyNM01GuQMNXw2PSj1Pqq8oBjM
Score9/10-
Detection of CryptoLocker Variants
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-