General
-
Target
2024-02-23_b05b7899548900186d8dbc082192cba2_cryptolocker
-
Size
61KB
-
Sample
240223-lw48bsfa34
-
MD5
b05b7899548900186d8dbc082192cba2
-
SHA1
28e12e590eb62162e77e7cc1f1a01eb2019e5e3a
-
SHA256
1ff4692fdedad6a7fec71f6ec8f2b9cb8ee630b5eb49a1db422cbb23b1440a5a
-
SHA512
18c850bf278a7e88b083b597fa810a3a78071fb3c2de18170749dd247389f556fee705498d0ab479f006531658f1b6510afd0b51268f206c1c0fb364fdab5143
-
SSDEEP
1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtskP82:BbdDmjr+OtEvwDpjM8O
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-23_b05b7899548900186d8dbc082192cba2_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-23_b05b7899548900186d8dbc082192cba2_cryptolocker.exe
Resource
win10v2004-20240221-en
Malware Config
Targets
-
-
Target
2024-02-23_b05b7899548900186d8dbc082192cba2_cryptolocker
-
Size
61KB
-
MD5
b05b7899548900186d8dbc082192cba2
-
SHA1
28e12e590eb62162e77e7cc1f1a01eb2019e5e3a
-
SHA256
1ff4692fdedad6a7fec71f6ec8f2b9cb8ee630b5eb49a1db422cbb23b1440a5a
-
SHA512
18c850bf278a7e88b083b597fa810a3a78071fb3c2de18170749dd247389f556fee705498d0ab479f006531658f1b6510afd0b51268f206c1c0fb364fdab5143
-
SSDEEP
1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtskP82:BbdDmjr+OtEvwDpjM8O
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-