General
-
Target
2024-02-23_5e7c9132e73c579462c921fc7af5b6fe_cryptolocker
-
Size
71KB
-
Sample
240223-yd6pnafg38
-
MD5
5e7c9132e73c579462c921fc7af5b6fe
-
SHA1
b34bf606cf69f471b79151d9a57c614a3728bcfc
-
SHA256
e59b1f600eb67367fccaa7d807d915438f656487ea2412dcc313042c66d50710
-
SHA512
84806a9ef168a2f7e96d49708b9f4d0b081c67157c6f496af401b70d759b2c051d77e7618af7b995c96006d884c98e90cd07c881b28e67f6d7d1b99f8bd770e3
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalL:1nK6a+qdOOtEvwDpj+
Behavioral task
behavioral1
Sample
2024-02-23_5e7c9132e73c579462c921fc7af5b6fe_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-23_5e7c9132e73c579462c921fc7af5b6fe_cryptolocker.exe
Resource
win10v2004-20240221-en
Malware Config
Targets
-
-
Target
2024-02-23_5e7c9132e73c579462c921fc7af5b6fe_cryptolocker
-
Size
71KB
-
MD5
5e7c9132e73c579462c921fc7af5b6fe
-
SHA1
b34bf606cf69f471b79151d9a57c614a3728bcfc
-
SHA256
e59b1f600eb67367fccaa7d807d915438f656487ea2412dcc313042c66d50710
-
SHA512
84806a9ef168a2f7e96d49708b9f4d0b081c67157c6f496af401b70d759b2c051d77e7618af7b995c96006d884c98e90cd07c881b28e67f6d7d1b99f8bd770e3
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalL:1nK6a+qdOOtEvwDpj+
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-