General
-
Target
2024-02-25_b3353d9d2c24bd195f16ff843d3366c1_cryptolocker
-
Size
64KB
-
Sample
240225-a72qsshd44
-
MD5
b3353d9d2c24bd195f16ff843d3366c1
-
SHA1
e1a7496d0da92c24992a413bb3939a7c4a2db928
-
SHA256
16d1dfbf001209d8a1f00382268e9a89d52b59483e28efbbb0c29695fa1b6885
-
SHA512
b4d01b561740c2e6df5a70b091bf1c37d757a4499cbfa66a6040ecb56411796fa25eaf3d839f249bb99678174cc94f28e7f32d9914262c6f313b797aa0326157
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjY6UnU5:1nK6a+qdOOtEvwDpjN
Behavioral task
behavioral1
Sample
2024-02-25_b3353d9d2c24bd195f16ff843d3366c1_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-25_b3353d9d2c24bd195f16ff843d3366c1_cryptolocker.exe
Resource
win10v2004-20240221-en
Malware Config
Targets
-
-
Target
2024-02-25_b3353d9d2c24bd195f16ff843d3366c1_cryptolocker
-
Size
64KB
-
MD5
b3353d9d2c24bd195f16ff843d3366c1
-
SHA1
e1a7496d0da92c24992a413bb3939a7c4a2db928
-
SHA256
16d1dfbf001209d8a1f00382268e9a89d52b59483e28efbbb0c29695fa1b6885
-
SHA512
b4d01b561740c2e6df5a70b091bf1c37d757a4499cbfa66a6040ecb56411796fa25eaf3d839f249bb99678174cc94f28e7f32d9914262c6f313b797aa0326157
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjY6UnU5:1nK6a+qdOOtEvwDpjN
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-