General
-
Target
2024-02-23_f5d6471b665d72393ac7fb2dd3a37510_cryptolocker
-
Size
46KB
-
Sample
240223-d9b5psaf7w
-
MD5
f5d6471b665d72393ac7fb2dd3a37510
-
SHA1
5db6c16072aa4e3a2089fb784326327545abd50e
-
SHA256
b89a358faf8c21ac5a03ae6c451ae389bb34a7ff38fa8926be06578cffada00b
-
SHA512
cf9e0318e82924e32b23ee6b6946450fbf0413d16143b6613fe002b2dec988a34a9f426ae1919cf25be1e549ec5b1f71a98ebcc7c6004297b4009a79f87da59c
-
SSDEEP
768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mo4gZ:qmbhXDmjr5MOtEvwDpj5cDtKkQZQr5
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-23_f5d6471b665d72393ac7fb2dd3a37510_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-23_f5d6471b665d72393ac7fb2dd3a37510_cryptolocker.exe
Resource
win10v2004-20240221-en
Malware Config
Targets
-
-
Target
2024-02-23_f5d6471b665d72393ac7fb2dd3a37510_cryptolocker
-
Size
46KB
-
MD5
f5d6471b665d72393ac7fb2dd3a37510
-
SHA1
5db6c16072aa4e3a2089fb784326327545abd50e
-
SHA256
b89a358faf8c21ac5a03ae6c451ae389bb34a7ff38fa8926be06578cffada00b
-
SHA512
cf9e0318e82924e32b23ee6b6946450fbf0413d16143b6613fe002b2dec988a34a9f426ae1919cf25be1e549ec5b1f71a98ebcc7c6004297b4009a79f87da59c
-
SSDEEP
768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mo4gZ:qmbhXDmjr5MOtEvwDpj5cDtKkQZQr5
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-