General
-
Target
2024-02-23_b96e2ce42b7292c9539196577329cebb_cryptolocker
-
Size
126KB
-
Sample
240223-b8r4esab67
-
MD5
b96e2ce42b7292c9539196577329cebb
-
SHA1
4f71dd1f4d4c664b261cc35f0b15fe3d425c1e92
-
SHA256
e3da5135d847992f536188354258dd3a06fb9c6c73ace9bde48232ada68e1e2a
-
SHA512
d9becba53978fd3d7dfd3a3283a732c0dc2354fb9ca971ade6fef3b45b8e4ddc46083a60bc8f9ae5eadeb0c6aa1c6af317289497da0e1e0ad326b50fb80bacf3
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1eC:AnBdOOtEvwDpj6zM
Behavioral task
behavioral1
Sample
2024-02-23_b96e2ce42b7292c9539196577329cebb_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-23_b96e2ce42b7292c9539196577329cebb_cryptolocker.exe
Resource
win10v2004-20240221-en
Malware Config
Targets
-
-
Target
2024-02-23_b96e2ce42b7292c9539196577329cebb_cryptolocker
-
Size
126KB
-
MD5
b96e2ce42b7292c9539196577329cebb
-
SHA1
4f71dd1f4d4c664b261cc35f0b15fe3d425c1e92
-
SHA256
e3da5135d847992f536188354258dd3a06fb9c6c73ace9bde48232ada68e1e2a
-
SHA512
d9becba53978fd3d7dfd3a3283a732c0dc2354fb9ca971ade6fef3b45b8e4ddc46083a60bc8f9ae5eadeb0c6aa1c6af317289497da0e1e0ad326b50fb80bacf3
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1eC:AnBdOOtEvwDpj6zM
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-