General
-
Target
2024-02-23_efa503c11bd217108a8b8cc6f0810d70_cryptolocker
-
Size
89KB
-
Sample
240223-js5ctaeb68
-
MD5
efa503c11bd217108a8b8cc6f0810d70
-
SHA1
5a94ec9cbebce0eb95a1fa51863f3acba8199c3d
-
SHA256
0d7c471761c42b9c8816f190bb29eb98ee5581012d9d3f88983ed0edfe6c2ac0
-
SHA512
47b7c34e08ea9ff9a0762ed35b99edc419fcbc5be4b4e9b962601d6a7f65301dc79257ce8612d6a9389fede9d34a8d045fa97b363ad197f23979cd74363b61e2
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgdxw:AnBdOOtEvwDpj6zg
Behavioral task
behavioral1
Sample
2024-02-23_efa503c11bd217108a8b8cc6f0810d70_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-02-23_efa503c11bd217108a8b8cc6f0810d70_cryptolocker.exe
Resource
win10v2004-20240221-en
Malware Config
Targets
-
-
Target
2024-02-23_efa503c11bd217108a8b8cc6f0810d70_cryptolocker
-
Size
89KB
-
MD5
efa503c11bd217108a8b8cc6f0810d70
-
SHA1
5a94ec9cbebce0eb95a1fa51863f3acba8199c3d
-
SHA256
0d7c471761c42b9c8816f190bb29eb98ee5581012d9d3f88983ed0edfe6c2ac0
-
SHA512
47b7c34e08ea9ff9a0762ed35b99edc419fcbc5be4b4e9b962601d6a7f65301dc79257ce8612d6a9389fede9d34a8d045fa97b363ad197f23979cd74363b61e2
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgdxw:AnBdOOtEvwDpj6zg
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-