General
-
Target
2024-02-23_50454099f4324105dd271e303e978ac4_cryptolocker
-
Size
46KB
-
Sample
240223-sde9tace6z
-
MD5
50454099f4324105dd271e303e978ac4
-
SHA1
7b91dbfdb1fb7b63aed92e5af72c90a9d80a7177
-
SHA256
7cd82e546868bfe80c23de9e75755b7c7bf95212a66e0eb97ef2a012977a5e09
-
SHA512
ad2a8e0cc26040c2a15faba6f04e06de191228d6f227b2d6a21e35cbe053e999f1b7c99bca771314e67b5f686374ec32c2b7d3711d8f7a356c5dc1bf7b0db6be
-
SSDEEP
768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Motal:qmbhXDmjr5MOtEvwDpj5cDtKkQZQTal
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-23_50454099f4324105dd271e303e978ac4_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-23_50454099f4324105dd271e303e978ac4_cryptolocker.exe
Resource
win10v2004-20240221-en
Malware Config
Targets
-
-
Target
2024-02-23_50454099f4324105dd271e303e978ac4_cryptolocker
-
Size
46KB
-
MD5
50454099f4324105dd271e303e978ac4
-
SHA1
7b91dbfdb1fb7b63aed92e5af72c90a9d80a7177
-
SHA256
7cd82e546868bfe80c23de9e75755b7c7bf95212a66e0eb97ef2a012977a5e09
-
SHA512
ad2a8e0cc26040c2a15faba6f04e06de191228d6f227b2d6a21e35cbe053e999f1b7c99bca771314e67b5f686374ec32c2b7d3711d8f7a356c5dc1bf7b0db6be
-
SSDEEP
768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Motal:qmbhXDmjr5MOtEvwDpj5cDtKkQZQTal
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-