General
-
Target
2024-02-24_92d2aa6e4e2fcc61a212e59e56d086cf_cryptolocker
-
Size
63KB
-
Sample
240224-b6m2paea84
-
MD5
92d2aa6e4e2fcc61a212e59e56d086cf
-
SHA1
93591c2c205be33a229f9ec314f37eafcf079e28
-
SHA256
9d94edce2782dd4a1f1d4d13ada21ea1edd8ebe45eee7c374f896f178407a181
-
SHA512
8d41d27d3bd5755243d569cc62859cfa85a967a8d60f1bb21baf200b178adfc9d8502e5d8a6b1ed42a7f3c43668af23e7fbb44425b7826fd8692fa8d2c86d131
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAoM:1nK6a+qdOOtEvwDpje
Behavioral task
behavioral1
Sample
2024-02-24_92d2aa6e4e2fcc61a212e59e56d086cf_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-24_92d2aa6e4e2fcc61a212e59e56d086cf_cryptolocker.exe
Resource
win10v2004-20240221-en
Malware Config
Targets
-
-
Target
2024-02-24_92d2aa6e4e2fcc61a212e59e56d086cf_cryptolocker
-
Size
63KB
-
MD5
92d2aa6e4e2fcc61a212e59e56d086cf
-
SHA1
93591c2c205be33a229f9ec314f37eafcf079e28
-
SHA256
9d94edce2782dd4a1f1d4d13ada21ea1edd8ebe45eee7c374f896f178407a181
-
SHA512
8d41d27d3bd5755243d569cc62859cfa85a967a8d60f1bb21baf200b178adfc9d8502e5d8a6b1ed42a7f3c43668af23e7fbb44425b7826fd8692fa8d2c86d131
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAoM:1nK6a+qdOOtEvwDpje
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-