General
-
Target
2024-02-25_ee21fde179d00d0e84e69b3b0fe89a7e_cryptolocker
-
Size
104KB
-
Sample
240225-hgxcdseg8s
-
MD5
ee21fde179d00d0e84e69b3b0fe89a7e
-
SHA1
4190039fbd1bc4d0877fce6ce51e3b1f16babff8
-
SHA256
a38eb16c106eb7fe42337c3f883c41a1d0e152931f94ab2306ad93d1c3bb6ba0
-
SHA512
a7d1ee87d892d8f74e7c9655cbc99070e4d7390dddbe428b9fddd1fe4bf6b2f0f577432261212068aef2f832df379576c3f471737487c1310a61905e3050e833
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6Gks9:1nK6a+qdOOtEvwDpj9
Behavioral task
behavioral1
Sample
2024-02-25_ee21fde179d00d0e84e69b3b0fe89a7e_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-25_ee21fde179d00d0e84e69b3b0fe89a7e_cryptolocker.exe
Resource
win10v2004-20240221-en
Malware Config
Targets
-
-
Target
2024-02-25_ee21fde179d00d0e84e69b3b0fe89a7e_cryptolocker
-
Size
104KB
-
MD5
ee21fde179d00d0e84e69b3b0fe89a7e
-
SHA1
4190039fbd1bc4d0877fce6ce51e3b1f16babff8
-
SHA256
a38eb16c106eb7fe42337c3f883c41a1d0e152931f94ab2306ad93d1c3bb6ba0
-
SHA512
a7d1ee87d892d8f74e7c9655cbc99070e4d7390dddbe428b9fddd1fe4bf6b2f0f577432261212068aef2f832df379576c3f471737487c1310a61905e3050e833
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6Gks9:1nK6a+qdOOtEvwDpj9
Score9/10-
Detection of CryptoLocker Variants
-
Detection of Cryptolocker Samples
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-