General
-
Target
2024-02-24_e2936d485a58820e859d49d32ad2bfd6_cryptolocker
-
Size
62KB
-
Sample
240224-f1vlssae26
-
MD5
e2936d485a58820e859d49d32ad2bfd6
-
SHA1
fc07abcda3ab11739245608e84b806838ee97ac3
-
SHA256
37c6ad029e5972f2cd2f1e72e9ab4b184fb991f8aee37a43312c18e651ac963d
-
SHA512
e5b2b22adb1b63d62654f2027d9a92f4cba04307a8524cd465fcab133e040eddee463271696fd575a88ff15b4f3af07a9c450fb013edf170e0bb3f192b74c519
-
SSDEEP
768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mnVwfXv:zj+soPSMOtEvwDpj4kpmeLmnwv
Behavioral task
behavioral1
Sample
2024-02-24_e2936d485a58820e859d49d32ad2bfd6_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-02-24_e2936d485a58820e859d49d32ad2bfd6_cryptolocker.exe
Resource
win10v2004-20240221-en
Malware Config
Targets
-
-
Target
2024-02-24_e2936d485a58820e859d49d32ad2bfd6_cryptolocker
-
Size
62KB
-
MD5
e2936d485a58820e859d49d32ad2bfd6
-
SHA1
fc07abcda3ab11739245608e84b806838ee97ac3
-
SHA256
37c6ad029e5972f2cd2f1e72e9ab4b184fb991f8aee37a43312c18e651ac963d
-
SHA512
e5b2b22adb1b63d62654f2027d9a92f4cba04307a8524cd465fcab133e040eddee463271696fd575a88ff15b4f3af07a9c450fb013edf170e0bb3f192b74c519
-
SSDEEP
768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mnVwfXv:zj+soPSMOtEvwDpj4kpmeLmnwv
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-