General
-
Target
2024-02-23_a7d0174e51e74ff99490478facf30c39_cryptolocker
-
Size
126KB
-
Sample
240223-v9jyzsfb7s
-
MD5
a7d0174e51e74ff99490478facf30c39
-
SHA1
2253a8fb86bd3154bd131eae013dbda69e8fb74b
-
SHA256
c85916ccb7468f03625a81341f7beed88d86bf4372a7e0de603a19449f26b764
-
SHA512
52164e3fd0884d0c517e20f97df610a4b4b96f90e4dfa110f742f2d82001abaf0a43b1b9ab0599c7fa908174ece3b851f8a412da897f82b3de7aa8acf9cae494
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1eIE7:AnBdOOtEvwDpj6zl
Behavioral task
behavioral1
Sample
2024-02-23_a7d0174e51e74ff99490478facf30c39_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-23_a7d0174e51e74ff99490478facf30c39_cryptolocker.exe
Resource
win10v2004-20240221-en
Malware Config
Targets
-
-
Target
2024-02-23_a7d0174e51e74ff99490478facf30c39_cryptolocker
-
Size
126KB
-
MD5
a7d0174e51e74ff99490478facf30c39
-
SHA1
2253a8fb86bd3154bd131eae013dbda69e8fb74b
-
SHA256
c85916ccb7468f03625a81341f7beed88d86bf4372a7e0de603a19449f26b764
-
SHA512
52164e3fd0884d0c517e20f97df610a4b4b96f90e4dfa110f742f2d82001abaf0a43b1b9ab0599c7fa908174ece3b851f8a412da897f82b3de7aa8acf9cae494
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1eIE7:AnBdOOtEvwDpj6zl
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-