General
-
Target
2024-02-24_d352ce20983672a716936424fa325967_cryptolocker
-
Size
83KB
-
Sample
240224-q3v1fseb8x
-
MD5
d352ce20983672a716936424fa325967
-
SHA1
5f5a7c19529cfb1a4005e68d7b8a2fbec4cc2729
-
SHA256
0815c427176276e0b9f16a8e4e26f7bd09db1b90c86164def157f7c0e1a4f480
-
SHA512
f36a89207db8ed9ee19066f0355ad853d3566f184e395948459e4e98e5a9f80b1a7c43416b62620449d7b63f446c0a31624f4fd2d7e3c4b15bef385dd33044bc
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyJS1nmv:zCsanOtEvwDpjy
Behavioral task
behavioral1
Sample
2024-02-24_d352ce20983672a716936424fa325967_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-24_d352ce20983672a716936424fa325967_cryptolocker.exe
Resource
win10v2004-20240221-en
Malware Config
Targets
-
-
Target
2024-02-24_d352ce20983672a716936424fa325967_cryptolocker
-
Size
83KB
-
MD5
d352ce20983672a716936424fa325967
-
SHA1
5f5a7c19529cfb1a4005e68d7b8a2fbec4cc2729
-
SHA256
0815c427176276e0b9f16a8e4e26f7bd09db1b90c86164def157f7c0e1a4f480
-
SHA512
f36a89207db8ed9ee19066f0355ad853d3566f184e395948459e4e98e5a9f80b1a7c43416b62620449d7b63f446c0a31624f4fd2d7e3c4b15bef385dd33044bc
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyJS1nmv:zCsanOtEvwDpjy
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-