General
-
Target
2024-02-24_48c0700c3c6c1778c9d2c7d4274d58f9_cryptolocker
-
Size
63KB
-
Sample
240224-d2yczafh35
-
MD5
48c0700c3c6c1778c9d2c7d4274d58f9
-
SHA1
8d4ec2148a5668172fced81f74d49f68950c1c03
-
SHA256
5e0bf9774d028f49d73bf0f7b53ed20a6473ba7a2e4f7e31150bd46379bd347e
-
SHA512
3b65a80a5d0f91fa674d853190e9362c048da744b782c498f66bc135eb305627c4ff94dac0beb0e13dc2156d15ead10ae742c637192cb086535ecb1ce89aa3f1
-
SSDEEP
768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mLZ5K79:zj+soPSMOtEvwDpj4kpmeLmW
Behavioral task
behavioral1
Sample
2024-02-24_48c0700c3c6c1778c9d2c7d4274d58f9_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-24_48c0700c3c6c1778c9d2c7d4274d58f9_cryptolocker.exe
Resource
win10v2004-20240221-en
Malware Config
Targets
-
-
Target
2024-02-24_48c0700c3c6c1778c9d2c7d4274d58f9_cryptolocker
-
Size
63KB
-
MD5
48c0700c3c6c1778c9d2c7d4274d58f9
-
SHA1
8d4ec2148a5668172fced81f74d49f68950c1c03
-
SHA256
5e0bf9774d028f49d73bf0f7b53ed20a6473ba7a2e4f7e31150bd46379bd347e
-
SHA512
3b65a80a5d0f91fa674d853190e9362c048da744b782c498f66bc135eb305627c4ff94dac0beb0e13dc2156d15ead10ae742c637192cb086535ecb1ce89aa3f1
-
SSDEEP
768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mLZ5K79:zj+soPSMOtEvwDpj4kpmeLmW
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-