General
-
Target
2024-02-24_937d7abd3aeb09df08a72c71f3b39492_cryptolocker
-
Size
63KB
-
Sample
240224-wj9mdsah9v
-
MD5
937d7abd3aeb09df08a72c71f3b39492
-
SHA1
ec180c6bd3cbc74661eb2a06476ec0de63412e9c
-
SHA256
c15d7f86cf7eb6ebb3060950ef135a1eac9790296e2e1b51f666e6c2c7343c85
-
SHA512
a4edcc86962030839dbb59cd5213a391dbe88fe48b91b0a097ec1740b46703e2c67390a2e1707d7e503e862955143163cd86153d231a1ce684e538cb74f07fbf
-
SSDEEP
768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mLZ5K7hFiWt:zj+soPSMOtEvwDpj4kpmeLmWp
Behavioral task
behavioral1
Sample
2024-02-24_937d7abd3aeb09df08a72c71f3b39492_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-24_937d7abd3aeb09df08a72c71f3b39492_cryptolocker.exe
Resource
win10v2004-20240221-en
Malware Config
Targets
-
-
Target
2024-02-24_937d7abd3aeb09df08a72c71f3b39492_cryptolocker
-
Size
63KB
-
MD5
937d7abd3aeb09df08a72c71f3b39492
-
SHA1
ec180c6bd3cbc74661eb2a06476ec0de63412e9c
-
SHA256
c15d7f86cf7eb6ebb3060950ef135a1eac9790296e2e1b51f666e6c2c7343c85
-
SHA512
a4edcc86962030839dbb59cd5213a391dbe88fe48b91b0a097ec1740b46703e2c67390a2e1707d7e503e862955143163cd86153d231a1ce684e538cb74f07fbf
-
SSDEEP
768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mLZ5K7hFiWt:zj+soPSMOtEvwDpj4kpmeLmWp
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-