General
-
Target
2024-02-23_8ead116e839fe14784ee9c30de712579_cryptolocker
-
Size
85KB
-
Sample
240223-hl1wdada3y
-
MD5
8ead116e839fe14784ee9c30de712579
-
SHA1
5177404e5792d388596509cd8e51c0c0953c0923
-
SHA256
d12c5c11c7fd9adeb1d5ceb5b650c828a682914e187c9a29f3597fe4af2ac398
-
SHA512
57d3c4284f86068279df72e842270184dbd9e42e045c5dcef7ca48015706146412f0bff16ac5303f800cdb7406df2ceb91843df0158ae6db47138b9a9a4c3455
-
SSDEEP
768:qkmnjFom/kLyMro2GtOOtEvwDpjeY10Y/YMsvlMdwPK80GQuchoIgtIgjse:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgH
Behavioral task
behavioral1
Sample
2024-02-23_8ead116e839fe14784ee9c30de712579_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-23_8ead116e839fe14784ee9c30de712579_cryptolocker.exe
Resource
win10v2004-20240221-en
Malware Config
Targets
-
-
Target
2024-02-23_8ead116e839fe14784ee9c30de712579_cryptolocker
-
Size
85KB
-
MD5
8ead116e839fe14784ee9c30de712579
-
SHA1
5177404e5792d388596509cd8e51c0c0953c0923
-
SHA256
d12c5c11c7fd9adeb1d5ceb5b650c828a682914e187c9a29f3597fe4af2ac398
-
SHA512
57d3c4284f86068279df72e842270184dbd9e42e045c5dcef7ca48015706146412f0bff16ac5303f800cdb7406df2ceb91843df0158ae6db47138b9a9a4c3455
-
SSDEEP
768:qkmnjFom/kLyMro2GtOOtEvwDpjeY10Y/YMsvlMdwPK80GQuchoIgtIgjse:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgH
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-