General
-
Target
2024-02-23_1bd5cb923fea1755e53d319b1c49d7be_cryptolocker
-
Size
37KB
-
Sample
240223-pm5paaff5y
-
MD5
1bd5cb923fea1755e53d319b1c49d7be
-
SHA1
2017db7519b57033a6ba6e7844c49a0e4853be30
-
SHA256
fcb5bc70a3b13a8135442a155b8f999581767d84b8cf3557dc6bab6306185ca7
-
SHA512
73b14076475b306e4134231f603c53fe32b93490055dc9e122c05041089e1aee85b17652cc1e9d2a41d879894be1dccf575f13a58d53556368bc2ea7512b6484
-
SSDEEP
384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSznHzl6AJvDSuVuAn:b/yC4GyNM01GuQMNXw2PSjHPbSuF
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-23_1bd5cb923fea1755e53d319b1c49d7be_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-23_1bd5cb923fea1755e53d319b1c49d7be_cryptolocker.exe
Resource
win10v2004-20240221-en
Malware Config
Targets
-
-
Target
2024-02-23_1bd5cb923fea1755e53d319b1c49d7be_cryptolocker
-
Size
37KB
-
MD5
1bd5cb923fea1755e53d319b1c49d7be
-
SHA1
2017db7519b57033a6ba6e7844c49a0e4853be30
-
SHA256
fcb5bc70a3b13a8135442a155b8f999581767d84b8cf3557dc6bab6306185ca7
-
SHA512
73b14076475b306e4134231f603c53fe32b93490055dc9e122c05041089e1aee85b17652cc1e9d2a41d879894be1dccf575f13a58d53556368bc2ea7512b6484
-
SSDEEP
384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSznHzl6AJvDSuVuAn:b/yC4GyNM01GuQMNXw2PSjHPbSuF
Score9/10-
Detection of CryptoLocker Variants
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-