General
-
Target
2024-02-24_c7988dde7c3ea2a6a9d355930641c630_cryptolocker
-
Size
93KB
-
Sample
240224-r453gseg62
-
MD5
c7988dde7c3ea2a6a9d355930641c630
-
SHA1
afd0eb5717926804015971abf2a8f6642ed28706
-
SHA256
02b218799010cc145c848913c7d54124c35ff45c2a4ab2b7f3c69f251f132845
-
SHA512
fbd9707f0e6a5f16e31311a6d149afeaa648345fc6365d4fdec1c8c1385614df61946d1fa4800f38aa58344d36c6d3d8934c7d45416c358fa34b6d982572760d
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp01y:AnBdOOtEvwDpj6zE
Behavioral task
behavioral1
Sample
2024-02-24_c7988dde7c3ea2a6a9d355930641c630_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-02-24_c7988dde7c3ea2a6a9d355930641c630_cryptolocker.exe
Resource
win10v2004-20240221-en
Malware Config
Targets
-
-
Target
2024-02-24_c7988dde7c3ea2a6a9d355930641c630_cryptolocker
-
Size
93KB
-
MD5
c7988dde7c3ea2a6a9d355930641c630
-
SHA1
afd0eb5717926804015971abf2a8f6642ed28706
-
SHA256
02b218799010cc145c848913c7d54124c35ff45c2a4ab2b7f3c69f251f132845
-
SHA512
fbd9707f0e6a5f16e31311a6d149afeaa648345fc6365d4fdec1c8c1385614df61946d1fa4800f38aa58344d36c6d3d8934c7d45416c358fa34b6d982572760d
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp01y:AnBdOOtEvwDpj6zE
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-