General
-
Target
2024-02-23_de5e1c34fab11f7ec44bb8bd059bae91_cryptolocker
-
Size
35KB
-
Sample
240223-fqr3xsca93
-
MD5
de5e1c34fab11f7ec44bb8bd059bae91
-
SHA1
007486c86fb610cabd4f397892df7daab633c821
-
SHA256
7be34d8af7ae5e4eee23bb429d0bb16e46545409139146781302f5e50239e8c6
-
SHA512
03600ec3ddfb99c2013a6f1795bfef10e203a481d9ee429a79a36b68c4f67c427fc5291cba8f92079296361ef30f4d4e04e6ff421a5529ea02ee7c56c0557ced
-
SSDEEP
768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLam5ax+j:qUmnpomddpMOtEvwDpjjaYai
Behavioral task
behavioral1
Sample
2024-02-23_de5e1c34fab11f7ec44bb8bd059bae91_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-23_de5e1c34fab11f7ec44bb8bd059bae91_cryptolocker.exe
Resource
win10v2004-20240221-en
Malware Config
Targets
-
-
Target
2024-02-23_de5e1c34fab11f7ec44bb8bd059bae91_cryptolocker
-
Size
35KB
-
MD5
de5e1c34fab11f7ec44bb8bd059bae91
-
SHA1
007486c86fb610cabd4f397892df7daab633c821
-
SHA256
7be34d8af7ae5e4eee23bb429d0bb16e46545409139146781302f5e50239e8c6
-
SHA512
03600ec3ddfb99c2013a6f1795bfef10e203a481d9ee429a79a36b68c4f67c427fc5291cba8f92079296361ef30f4d4e04e6ff421a5529ea02ee7c56c0557ced
-
SSDEEP
768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLam5ax+j:qUmnpomddpMOtEvwDpjjaYai
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-